Search Results for Basic principles - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBasic$002bprinciples$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-22T02:42:40Z Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners ent://SD_ILS/0/SD_ILS:608948 2026-03-22T02:42:40Z 2026-03-22T02:42:40Z Author&#160;Guo, Fuchun. author. (orcid)0000-0001-6939-7710&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Nguyen, Khoa. author.&#160;Chen, Xiaofeng. author.&#160;Zhao, Zhen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Protection for Software Development and IT A Practical Introduction ent://SD_ILS/0/SD_ILS:607421 2026-03-22T02:42:40Z 2026-03-22T02:42:40Z Author&#160;Kneuper, Ralf. author. (orcid)0000-0003-3225-5895&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-70639-8">https://doi.org/10.1007/978-3-662-70639-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611707 2026-03-22T02:42:40Z 2026-03-22T02:42:40Z Author&#160;Berendt, Bettina. editor.&#160;Engel, Thomas. editor.&#160;Ikonomou, Demosthenes. editor.&#160;Le M&eacute;tayer, Daniel. editor.&#160;Schiffner, Stefan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:614814 2026-03-22T02:42:40Z 2026-03-22T02:42:40Z Author&#160;Rowe, Neil C. author.&#160;Rrushi, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Sensor Networks Security, Coverage, and Localization ent://SD_ILS/0/SD_ILS:611390 2026-03-22T02:42:40Z 2026-03-22T02:42:40Z Author&#160;Selmic, Rastko R. author.&#160;Phoha, Vir V. author.&#160;Serwadda, Abdul. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>