Search Results for Data protection. - Narrowed by: 2006SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026ps$003d300?2024-10-31T17:57:42ZTolley's data protection handbookent://SD_ILS/0/SD_ILS:2488582024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Singleton, Susan.<br/>Preferred Shelf Number KJC1682 S56 2006<br/>Format: Books<br/>Availability Law Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papersent://SD_ILS/0/SD_ILS:1857072024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852352024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Lipmaa, Helger. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852592024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Barua, Rana. editor. Lange, Tanja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11941378">http://dx.doi.org/10.1007/11941378</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Topics in Cryptology – CT-RSA 2007 The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1857872024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:1857322024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Buttyán, Levente. editor. Gligor, Virgil D. editor. Westhoff, Dirk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1851802024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Rhee, Min Surp. editor. Lee, Byoungcheon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852072024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Pointcheval, David. editor. Mu, Yi. editor. Chen, Kefei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852142024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Lai, Xuejia. editor. Chen, Kefei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1852172024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Ning, Peng. editor. Qing, Sihan. editor. Li, Ninghui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Distributed Computing and Networking 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1853702024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Chaudhuri, Soma. editor. Das, Samir R. editor. Paul, Himadri S. editor. Tirthapura, Srikanta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11947950">http://dx.doi.org/10.1007/11947950</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:1855882024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Danezis, George. editor. Golle, Philippe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:1855912024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Nguyen, Phong Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1856662024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Bagchi, Aditya. editor. Atluri, Vijayalakshmi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2847902024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Landoll, Douglas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The CISO handbook a practical guide to securing your companyent://SD_ILS/0/SD_ILS:2904162024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Gentile, Michael. Collette, Ronald D. August, Thomas D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>New Dimensions in Privacy Law International and Comparative Perspectivesent://SD_ILS/0/SD_ILS:2370182024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Kenyon, Andrew T.. Richardson, Megan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511494208">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:2536612024-10-31T17:57:42Z2024-10-31T17:57:42ZAuthor Cole, Eric. Ring, Sandra.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>