Search Results for Auditing. - Narrowed by: Data encryption (Computer science).SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAuditing.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2026-05-16T02:48:30ZHealthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Recordsent://SD_ILS/0/SD_ILS:6186052026-05-16T02:48:30Z2026-05-16T02:48:30ZAuthor Robichau, Bernard Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical Hadoop Securityent://SD_ILS/0/SD_ILS:6185512026-05-16T02:48:30Z2026-05-16T02:48:30ZAuthor Lakhe, Bhushan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6545-0">https://doi.org/10.1007/978-1-4302-6545-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>