Search Results for - Narrowed by: 2016 - Data protection. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue? 2024-09-26T01:48:57Z Analyzing and securing social networks ent://SD_ILS/0/SD_ILS:2313385 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar">https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482243284/?ar">https://learning.oreilly.com/library/view/~/9781482243284/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482243284">https://learning.oreilly.com/library/view/~/9781482243284</a><br/>Format:&#160;Electronic Resources<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:2313484 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format:&#160;Electronic Resources<br/> Information theft prevention : theory and practice ent://SD_ILS/0/SD_ILS:2315550 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format:&#160;Electronic Resources<br/> You--for sale : protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2308465 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Hadoop security : a hands-on approach to securing big data clusters ent://SD_ILS/0/SD_ILS:2310270 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2310290 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security policies, procedures, and standards : a practitioner's reference ent://SD_ILS/0/SD_ILS:2310749 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS 3.1 : the standard that killed SSL ent://SD_ILS/0/SD_ILS:2308468 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Williams, Branden R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128046494">https://learning.oreilly.com/library/view/~/9780128046494</a> <a href="https://learning.oreilly.com/library/view/~/9780128046494/?ar">https://learning.oreilly.com/library/view/~/9780128046494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar">https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data governance : frameworks and strategies ent://SD_ILS/0/SD_ILS:2309871 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Adler, John, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar">https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491942352/?ar">https://learning.oreilly.com/videos/~/9781491942352/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM ProtecTIER implementation and best practices guide ent://SD_ILS/0/SD_ILS:2310839 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Orlando, Karen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441696/?ar">https://learning.oreilly.com/library/view/~/9780738441696/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar</a><br/>Format:&#160;Electronic Resources<br/> The CISO Handbook ent://SD_ILS/0/SD_ILS:2323677 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a> <a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Security Management Handbook, Volume 6, 6th Edition ent://SD_ILS/0/SD_ILS:2323397 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a> <a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format:&#160;Electronic Resources<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:2208965 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:2209444 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:2110952 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084644 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Fahrnberger, G&uuml;nter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Deletion ent://SD_ILS/0/SD_ILS:2084749 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Reardon, Joel. author.<br/><a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084839 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 &ndash; December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085698 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086070 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084254 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085036 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2027620 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Johnson, Anne, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Data-Breach-Aftermath.pdf">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://dx.doi.org/10.17226/23559">http://dx.doi.org/10.17226/23559</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS 3.1 : the standard that killed SSL ent://SD_ILS/0/SD_ILS:2098335 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4053870">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Big data and ethics : the medical datasphere ent://SD_ILS/0/SD_ILS:2210068 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;B&eacute;ranger, J&eacute;r&ocirc;me, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4529549">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2228331 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format:&#160;Electronic Resources<br/> 88 privacy breaches to beware of : practical data protection tips from real-life experiences ent://SD_ILS/0/SD_ILS:2265185 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Facing cyber threats head on : protecting yourself and your business ent://SD_ILS/0/SD_ILS:2266274 2024-09-26T01:48:57Z 2024-09-26T01:48:57Z by&#160;Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format:&#160;Electronic Resources<br/>