Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
3 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Rational Cybersecurity for Business : The Security Leaders' Guide to Business Alignment
Rational Cybersecurity for Business : The Security Leaders' Guide to Business Alignment
by
Blum, Dan
DOAB: download the publication
DOAB: description of the publication
Format:
Books
2.
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields
by
Miyaji, Atsuko
DOAB: download the publication
DOAB: description of the publication
Format:
Books
View Other Search Results
3.
The Coupling of Safety and Security : Exploring Interrelations in Theory and Practice
The Coupling of Safety and Security : Exploring Interrelations in Theory and Practice
by
Bieder, Corinne
DOAB: download the publication
DOAB: description of the publication
Format:
Books
Select All
1
3 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Publication Date: 2020
Included
Subject: Computer security
Included
Subject: Open Access
Author
Include
Exclude
Bieder, Corinne
(1)
Blum, Dan
(1)
Mimoto, Tomoaki
(1)
Miyaji, Atsuko
(1)
Pettersen Gould, Kenneth
(1)
Material Type
Include
Exclude
E-Book
(3)
Subject
Include
Exclude
Security
(2)
Agile security
(1)
Big Data Security
(1)
Computer Science
(1)
Crime & criminology
(1)
Crime Control and Security
(1)
Cyber Security
(1)
Cyber-resilience
(1)
Cybersecurity
(1)
Cybersecurity RACIs
(1)
Cybersecurity maturity model
(1)
Cybersecurity strategy
(1)
DevSecOps
(1)
Economics of industrial organisation
(1)
High Risk Organizations
(1)
Industrial Organization
(1)
Industrial and Production Engineering
(1)
Information Security
(1)
Modern identity
(1)
Principles and Models of Security
(1)
Privacy Protection
(1)
Quality Control, Reliability, Safety and Risk
(1)
Rational cybersecurity
(1)
Reliability engineering
(1)
Risk Management
(1)
Risk management
(1)
Safety Management
(1)
Safety Security Efficiency
(1)
Safety and Security
(1)
Secure Date Management
(1)
Security & fire alarm systems
(1)
Security Interfaces
(1)
Security Management
(1)
Security Science and Technology
(1)
Security championship
(1)
Security culture
(1)
Security governance
(1)
Shared responsibility
(1)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
DOAB Collection
(3)
Library
Include
Exclude
IYTE Library
(3)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}