Search Results for - Narrowed by: 2016 - Data protection.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?2024-09-26T01:48:57ZAnalyzing and securing social networksent://SD_ILS/0/SD_ILS:23133852024-09-26T01:48:57Z2024-09-26T01:48:57Zby Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar">https://go.oreilly.com/library-access/library/view/-/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284/?ar">https://learning.oreilly.com/library/view/~/9781482243284/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482243284">https://learning.oreilly.com/library/view/~/9781482243284</a><br/>Format: Electronic Resources<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:23134842024-09-26T01:48:57Z2024-09-26T01:48:57Zby Williams, Barry L.<br/><a href="https://learning.oreilly.com/library/view/~/9781466580589/?ar">https://learning.oreilly.com/library/view/~/9781466580589/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar">https://go.oreilly.com/library-access/library/view/-/9781466580589/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466580589">https://learning.oreilly.com/library/view/~/9781466580589</a><br/>Format: Electronic Resources<br/>Information theft prevention : theory and practiceent://SD_ILS/0/SD_ILS:23155502024-09-26T01:48:57Z2024-09-26T01:48:57Zby Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Electronic Resources<br/>You--for sale : protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:23084652024-09-26T01:48:57Z2024-09-26T01:48:57Zby Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Hadoop security : a hands-on approach to securing big data clustersent://SD_ILS/0/SD_ILS:23102702024-09-26T01:48:57Z2024-09-26T01:48:57Zby Bean, Jeff, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar">https://go.oreilly.com/library-access/library/view/-/9781771375054/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781771375054/?ar">https://learning.oreilly.com/videos/~/9781771375054/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-09-26T01:48:57Z2024-09-26T01:48:57Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Information security policies, procedures, and standards : a practitioner's referenceent://SD_ILS/0/SD_ILS:23107492024-09-26T01:48:57Z2024-09-26T01:48:57Zby Landoll, Douglas J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482245912/?ar">https://learning.oreilly.com/library/view/~/9781482245912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar">https://go.oreilly.com/library-access/library/view/-/9781482245912/?ar</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:23084682024-09-26T01:48:57Z2024-09-26T01:48:57Zby Williams, Branden R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128046494">https://learning.oreilly.com/library/view/~/9780128046494</a>
<a href="https://learning.oreilly.com/library/view/~/9780128046494/?ar">https://learning.oreilly.com/library/view/~/9780128046494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar">https://go.oreilly.com/library-access/library/view/-/9780128046494/?ar</a><br/>Format: Electronic Resources<br/>Data governance : frameworks and strategiesent://SD_ILS/0/SD_ILS:23098712024-09-26T01:48:57Z2024-09-26T01:48:57Zby Adler, John, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar">https://go.oreilly.com/library-access/library/view/-/9781491942352/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491942352/?ar">https://learning.oreilly.com/videos/~/9781491942352/?ar</a><br/>Format: Electronic Resources<br/>IBM ProtecTIER implementation and best practices guideent://SD_ILS/0/SD_ILS:23108392024-09-26T01:48:57Z2024-09-26T01:48:57Zby Orlando, Karen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441696/?ar">https://learning.oreilly.com/library/view/~/9780738441696/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441696/?ar</a><br/>Format: Electronic Resources<br/>The CISO Handbookent://SD_ILS/0/SD_ILS:23236772024-09-26T01:48:57Z2024-09-26T01:48:57Zby Gentile, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031379">https://learning.oreilly.com/library/view/~/9781420031379</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031379/?ar">https://learning.oreilly.com/library/view/~/9781420031379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031379/?ar</a><br/>Format: Electronic Resources<br/>Information Security Management Handbook, Volume 6, 6th Editionent://SD_ILS/0/SD_ILS:23233972024-09-26T01:48:57Z2024-09-26T01:48:57Zby Tipton, Harold, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439893159">https://learning.oreilly.com/library/view/~/9781439893159</a>
<a href="https://learning.oreilly.com/library/view/~/9781439893159/?ar">https://learning.oreilly.com/library/view/~/9781439893159/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar">https://go.oreilly.com/library-access/library/view/-/9781439893159/?ar</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:22089652024-09-26T01:48:57Z2024-09-26T01:48:57Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:22094442024-09-26T01:48:57Z2024-09-26T01:48:57Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:21109522024-09-26T01:48:57Z2024-09-26T01:48:57Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846442024-09-26T01:48:57Z2024-09-26T01:48:57Zby Fahrnberger, Günter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format: Electronic Resources<br/>Secure Data Deletionent://SD_ILS/0/SD_ILS:20847492024-09-26T01:48:57Z2024-09-26T01:48:57Zby Reardon, Joel. author.<br/><a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-09-26T01:48:57Z2024-09-26T01:48:57Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-09-26T01:48:57Z2024-09-26T01:48:57Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-09-26T01:48:57Z2024-09-26T01:48:57Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-09-26T01:48:57Z2024-09-26T01:48:57Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-09-26T01:48:57Z2024-09-26T01:48:57Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-09-26T01:48:57Z2024-09-26T01:48:57Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-09-26T01:48:57Z2024-09-26T01:48:57Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-09-26T01:48:57Z2024-09-26T01:48:57Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-09-26T01:48:57Z2024-09-26T01:48:57Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:20276202024-09-26T01:48:57Z2024-09-26T01:48:57Zby Johnson, Anne, rapporteur.<br/><a href="https://catalog.iyte.edu.tr/files/kitap/Data-Breach-Aftermath.pdf">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://dx.doi.org/10.17226/23559">http://dx.doi.org/10.17226/23559</a><br/>Format: Electronic Resources<br/>PCI DSS 3.1 : the standard that killed SSLent://SD_ILS/0/SD_ILS:20983352024-09-26T01:48:57Z2024-09-26T01:48:57Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4053870">Click to View</a><br/>Format: Electronic Resources<br/>Big data and ethics : the medical datasphereent://SD_ILS/0/SD_ILS:22100682024-09-26T01:48:57Z2024-09-26T01:48:57Zby Béranger, Jérôme, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4529549">Click to View</a><br/>Format: Electronic Resources<br/>Data breach aftermath and recovery for individuals and institutions : proceedings of a workshopent://SD_ILS/0/SD_ILS:22283312024-09-26T01:48:57Z2024-09-26T01:48:57Zby Johnson, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4690560">Click to View</a><br/>Format: Electronic Resources<br/>88 privacy breaches to beware of : practical data protection tips from real-life experiencesent://SD_ILS/0/SD_ILS:22651852024-09-26T01:48:57Z2024-09-26T01:48:57Zby Shepherdson, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4558135">Click to View</a><br/>Format: Electronic Resources<br/>Facing cyber threats head on : protecting yourself and your businessent://SD_ILS/0/SD_ILS:22662742024-09-26T01:48:57Z2024-09-26T01:48:57Zby Minick, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4773207">Click to View</a><br/>Format: Electronic Resources<br/>