Search Results for - Narrowed by: COMPUTERS -- Security -- General. - Data protection.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?
2024-06-20T07:00:50Z
Cloud computing security : foundations and challenges
ent://SD_ILS/0/SD_ILS:2311524
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781315354927">https://learning.oreilly.com/library/view/~/9781315354927</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar">https://go.oreilly.com/library-access/library/view/-/9781315354927/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315354927/?ar">https://learning.oreilly.com/library/view/~/9781315354927/?ar</a><br/>Format: Electronic Resources<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:2305897
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise architecture and information assurance : developing a secure foundation
ent://SD_ILS/0/SD_ILS:2299279
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Scholz, James A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar">https://go.oreilly.com/library-access/library/view/-/9781439841594/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439841594/?ar">https://learning.oreilly.com/library/view/~/9781439841594/?ar</a><br/>Format: Electronic Resources<br/>
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
ent://SD_ILS/0/SD_ILS:2304861
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Bachrach, Daniel G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar">https://go.oreilly.com/library-access/library/view/-/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675/?ar">https://learning.oreilly.com/library/view/~/9781484203675/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484203675">https://learning.oreilly.com/library/view/~/9781484203675</a><br/>Format: Electronic Resources<br/>
Information security management handbook . Volume 7
ent://SD_ILS/0/SD_ILS:2300299
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by O'Hanley, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498">https://learning.oreilly.com/library/view/~/9781466567498</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567498/?ar">https://learning.oreilly.com/library/view/~/9781466567498/?ar</a><br/>Format: Electronic Resources<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:2300180
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Peltier, Thomas R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar">https://go.oreilly.com/library-access/library/view/-/9781439810637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439810637/?ar">https://learning.oreilly.com/library/view/~/9781439810637/?ar</a><br/>Format: Electronic Resources<br/>
Anti-hacker tool kit.
ent://SD_ILS/0/SD_ILS:2303630
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format: Electronic Resources<br/>
Information security : principles and practices
ent://SD_ILS/0/SD_ILS:2303412
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Merkow, Mark S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar">https://go.oreilly.com/library-access/library/view/-/9780133589412/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133589412/?ar">https://learning.oreilly.com/library/view/~/9780133589412/?ar</a><br/>Format: Electronic Resources<br/>
Practical Hadoop security
ent://SD_ILS/0/SD_ILS:2305422
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Lakhe, Bhushan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265450">https://learning.oreilly.com/library/view/~/9781430265450</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265450/?ar">https://learning.oreilly.com/library/view/~/9781430265450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265450/?ar</a><br/>Format: Electronic Resources<br/>
Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
ent://SD_ILS/0/SD_ILS:2298053
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Yerrid, K. C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar">https://go.oreilly.com/library-access/library/view/-/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960/?ar">https://learning.oreilly.com/library/view/~/9781849519960/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849519960">https://learning.oreilly.com/library/view/~/9781849519960</a><br/>Format: Electronic Resources<br/>
Information security management principles
ent://SD_ILS/0/SD_ILS:2299451
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Alexander, David (Information security practitioner)<br/><a href="https://learning.oreilly.com/library/view/~/9781780171753/?ar">https://learning.oreilly.com/library/view/~/9781780171753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar">https://go.oreilly.com/library-access/library/view/-/9781780171753/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780171753">https://learning.oreilly.com/library/view/~/9781780171753</a><br/>Format: Electronic Resources<br/>
Nine steps to success : an ISO27001:2013 implementation overview
ent://SD_ILS/0/SD_ILS:2300436
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Calder, Alan, 1957- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117/?ar">https://learning.oreilly.com/library/view/~/9781849285117/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285117">https://learning.oreilly.com/library/view/~/9781849285117</a><br/>Format: Electronic Resources<br/>
Introduction to computer and network security : navigating shades of gray
ent://SD_ILS/0/SD_ILS:2313482
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>
Internet and surveillance : the challenges of Web 2.0 and social media
ent://SD_ILS/0/SD_ILS:2294996
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Fuchs, Christian, 1976-<br/><a href="https://learning.oreilly.com/library/view/~/9780415891608/?ar">https://learning.oreilly.com/library/view/~/9780415891608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar">https://go.oreilly.com/library-access/library/view/-/9780415891608/?ar</a><br/>Format: Electronic Resources<br/>
Once more unto the breach : managing information security in an uncertain world
ent://SD_ILS/0/SD_ILS:2298022
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Simmons, Andrea C.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283908">https://learning.oreilly.com/library/view/~/9781849283908</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283908/?ar">https://learning.oreilly.com/library/view/~/9781849283908/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283908/?ar</a><br/>Format: Electronic Resources<br/>
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
ent://SD_ILS/0/SD_ILS:2291661
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Canavan, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar">https://go.oreilly.com/library-access/library/view/-/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216/?ar">https://learning.oreilly.com/library/view/~/9780470916216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470916216">https://learning.oreilly.com/library/view/~/9780470916216</a><br/>Format: Electronic Resources<br/>
The chief information security officer : insights, tools and survival skills
ent://SD_ILS/0/SD_ILS:2291384
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Kouns, Barry.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281966">https://learning.oreilly.com/library/view/~/9781849281966</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281966/?ar">https://learning.oreilly.com/library/view/~/9781849281966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281966/?ar</a><br/>Format: Electronic Resources<br/>
Expert Oracle and Java security : programming secure Oracle database applications with Java
ent://SD_ILS/0/SD_ILS:2293224
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Coffin, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781430238317">https://learning.oreilly.com/library/view/~/9781430238317</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar">https://go.oreilly.com/library-access/library/view/-/9781430238317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430238317/?ar">https://learning.oreilly.com/library/view/~/9781430238317/?ar</a><br/>Format: Electronic Resources<br/>
Auditing cloud computing : a security and privacy guide
ent://SD_ILS/0/SD_ILS:2292255
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Halpert, Ben, 1986-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar">https://go.oreilly.com/library-access/library/view/-/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043/?ar">https://learning.oreilly.com/library/view/~/9781118116043/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118116043">https://learning.oreilly.com/library/view/~/9781118116043</a><br/>Format: Electronic Resources<br/>
Mobile device security for dummies
ent://SD_ILS/0/SD_ILS:2293515
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Campagna, Rich R.<br/><a href="https://learning.oreilly.com/library/view/~/9781118093801/?ar">https://learning.oreilly.com/library/view/~/9781118093801/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar">https://go.oreilly.com/library-access/library/view/-/9781118093801/?ar</a><br/>Format: Electronic Resources<br/>
Preventing good people from doing bad things : implementing least privilege
ent://SD_ILS/0/SD_ILS:2293278
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Electronic Resources<br/>
Information security for management
ent://SD_ILS/0/SD_ILS:309255
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format: Electronic Resources<br/>
Managing Information Security Breaches : Studies from Real Life.
ent://SD_ILS/0/SD_ILS:2290674
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>
The myths of security : what the computer security industry doesn't want you to know
ent://SD_ILS/0/SD_ILS:2106561
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>
How to secure and audit Oracle 10g and 11g
ent://SD_ILS/0/SD_ILS:2286324
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>
How to survive a data breach : a pocket guide
ent://SD_ILS/0/SD_ILS:2290079
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format: Electronic Resources<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:343739
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format: Electronic Resources<br/>
Information security policy, processes, and practices
ent://SD_ILS/0/SD_ILS:293000
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format: Electronic Resources<br/>
Netcat power tools
ent://SD_ILS/0/SD_ILS:2285156
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Kanclirz, Jan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492577">https://learning.oreilly.com/library/view/~/9781597492577</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492577/?ar">https://learning.oreilly.com/library/view/~/9781597492577/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492577/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492577/?ar</a><br/>Format: Electronic Resources<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:2285226
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Clark, Champ, III.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492249">https://learning.oreilly.com/library/view/~/9781597492249</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492249/?ar">https://learning.oreilly.com/library/view/~/9781597492249/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492249/?ar</a><br/>Format: Electronic Resources<br/>
Information security management principles : an ISEB certificate
ent://SD_ILS/0/SD_ILS:2290300
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Taylor, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/9781902505909/?ar">https://learning.oreilly.com/library/view/~/9781902505909/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar">https://go.oreilly.com/library-access/library/view/-/9781902505909/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781902505909">https://learning.oreilly.com/library/view/~/9781902505909</a><br/>Format: Electronic Resources<br/>
FISMA certification & accreditation handbook
ent://SD_ILS/0/SD_ILS:341700
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format: Electronic Resources<br/>
The shellcoder's handbook : discovering and exploiting security holes
ent://SD_ILS/0/SD_ILS:2283852
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format: Electronic Resources<br/>
FISMA certification & accreditation handbook
ent://SD_ILS/0/SD_ILS:2283639
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format: Electronic Resources<br/>
Insider threat : protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:2281991
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Electronic Resources<br/>
Digital identity
ent://SD_ILS/0/SD_ILS:2293288
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Electronic Resources<br/>
Building an information security awareness program
ent://SD_ILS/0/SD_ILS:2281782
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a>
<a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format: Electronic Resources<br/>
Data privacy in the information age
ent://SD_ILS/0/SD_ILS:265140
2024-06-20T07:00:50Z
2024-06-20T07:00:50Z
by Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format: Electronic Resources<br/>