Search Results for Data protection. - Narrowed by: COMPUTERS.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300?
2026-02-20T13:49:10Z
Artificial intelligence and cybersecurity in healthcare
ent://SD_ILS/0/SD_ILS:599741
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Agrawal, Rashmi, editor.<br/>Preferred Shelf Number R859.7 .A78 A78 2025 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Preferred Shelf Number QA76.9 .C65 N38 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Environmental monitoring using artificial intelligence .
ent://SD_ILS/0/SD_ILS:599719
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Preferred Shelf Number QH541.15 .M64 E55 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394270392">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394270392</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Edge computing : systems and applications
ent://SD_ILS/0/SD_ILS:600006
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Xu, Lanyu, author. Shi, Weisong, author.<br/>Preferred Shelf Number QA76.583 .X83 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285860">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285860</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic communication interception technologies and issues of power
ent://SD_ILS/0/SD_ILS:598620
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Ventre, Daniel, author. Guillot, Philippe, author.<br/>Preferred Shelf Number TK7882 .E2 V46 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394236725">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394236725</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data exfiltration threats and prevention techniques : machine learning and memory-based data security
ent://SD_ILS/0/SD_ILS:598245
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Tari, Zahir, 1961- author. Sohrabi, Nasrin, 1982- author. Samadi, Yasaman, 1993- author. Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number TK5105.59 .T365 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and privacy vision in 6G : a comprehensive guide
ent://SD_ILS/0/SD_ILS:598347
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Preferred Shelf Number TK5103.252 .P67 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Moyo, Siegfried, author.<br/>Preferred Shelf Number HF5548.37 .M68 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digitization of healthcare data using blockchain
ent://SD_ILS/0/SD_ILS:597646
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Poongodi, T., editor. Sumathi, D., editor. Balusamy, Balamurugan, editor. Savita, K. S., editor.<br/>Preferred Shelf Number R858 .D54 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792734</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Library transformation strategies
ent://SD_ILS/0/SD_ILS:597901
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Accart, Jean-Philippe, author.<br/>Preferred Shelf Number Z678 .A33 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394173648">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394173648</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integration of cloud computing with Internet of things : foundations, analytics, and applications
ent://SD_ILS/0/SD_ILS:596603
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Mangla, Monika, editor. Satpathy, Suneeta, editor. Nayak, Bhagirathi, 1963- editor. Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.585 .I53 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769323">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769323</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine learning for healthcare applications
ent://SD_ILS/0/SD_ILS:596667
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number R858 .M334 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792611">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119792611</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and its challenges in the 21st Century
ent://SD_ILS/0/SD_ILS:597077
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Guerrier, Claudine, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for distributed systems security
ent://SD_ILS/0/SD_ILS:595146
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
MCA Modern Desktop Administrator study guide : Exam MD-100
ent://SD_ILS/0/SD_ILS:595427
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Panek, William, 1970- author.<br/>Preferred Shelf Number QA76.774 .M435<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119605980">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119605980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:594455
2026-02-20T13:49:10Z
2026-02-20T13:49:10Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>