Search Results for Business -- Data processing. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBusiness$002b--$002bData$002bprocessing.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-04-06T01:51:59Z The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Processing and Networking Proceedings of ICDPN 2024, Volume 1 ent://SD_ILS/0/SD_ILS:609233 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Swaroop, Abhishek. editor.&#160;Virdee, Bal. editor. (orcid)0000-0001-7203-0039&#160;Correia, S&eacute;rgio Duarte. editor.&#160;Valicek, Jan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3102-5">https://doi.org/10.1007/978-981-96-3102-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Processing and Networking Proceedings of ICDPN 2024, Volume 2 ent://SD_ILS/0/SD_ILS:609939 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Swaroop, Abhishek. editor.&#160;Virdee, Bal. editor. (orcid)0000-0001-7203-0039&#160;Correia, S&eacute;rgio Duarte. editor.&#160;Valicek, Jan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-5535-9">https://doi.org/10.1007/978-981-96-5535-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Artificial-Business Analytics and Quantum Machine Learning Select Proceedings of the 3rd International Conference, Com-IT-Con 2023, Volume 2 ent://SD_ILS/0/SD_ILS:605616 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Santosh, KC. editor. (orcid)0000-0003-4176-0236&#160;Nandal, Poonam. editor.&#160;Sood, Sandeep Kumar. editor.&#160;Pandey, Hari Mohan. editor. (orcid)0000-0002-9128-068X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-4860-0">https://doi.org/10.1007/978-981-97-4860-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data quality : empowering businesses with analytics and AI ent://SD_ILS/0/SD_ILS:598155 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Southekal, Prashanth H., author.<br/>Preferred Shelf Number&#160;HF5548.2 .S687 2023 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:549829 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2021 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SECURITY STRATEGY : from requirements to reality. ent://SD_ILS/0/SD_ILS:545098 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;STACKPOLE, BILL.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:611848 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Mandal, J. K. editor. (orcid)0000-0001-9447-647X&#160;Dutta, Paramartha. editor.&#160;Mukhopadhyay, Somnath. editor. (orcid)0000-0002-4532-6245&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6427-2">https://doi.org/10.1007/978-981-10-6427-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:613293 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67876-4">https://doi.org/10.1007/978-3-319-67876-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:611150 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Mandal, J. K. editor. (orcid)0000-0001-9447-647X&#160;Dutta, Paramartha. editor.&#160;Mukhopadhyay, Somnath. editor. (orcid)0000-0002-4532-6245&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6430-2">https://doi.org/10.1007/978-981-10-6430-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:617933 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Obaidat, Mohammad S. editor.&#160;Lorenz, Pascal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-30222-5">https://doi.org/10.1007/978-3-319-30222-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:544153 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Collette, Ronald D., author.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Preferred Shelf Number&#160;HF5548.37 .G462 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2026-04-06T01:51:59Z 2026-04-06T01:51:59Z Author&#160;Kairab, Sudhanshu., author.<br/>Preferred Shelf Number&#160;HF5548.32 .K345 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>