Search Results for Data protection. - Narrowed by: Criminology. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Criminology.$002509Criminology.$0026ps$003d300$0026isd$003dtrue? 2024-11-01T02:57:47Z Data Protection in a Profiled World ent://SD_ILS/0/SD_ILS:205340 2024-11-01T02:57:47Z 2024-11-01T02:57:47Z Author&#160;Gutwirth, Serge. editor.&#160;Poullet, Yves. editor.&#160;De Hert, Paul. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-8865-9">http://dx.doi.org/10.1007/978-90-481-8865-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computers, Privacy and Data Protection: an Element of Choice ent://SD_ILS/0/SD_ILS:205901 2024-11-01T02:57:47Z 2024-11-01T02:57:47Z Author&#160;Gutwirth, Serge. editor.&#160;Poullet, Yves. editor.&#160;De Hert, Paul. editor.&#160;Leenes, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-0641-5">http://dx.doi.org/10.1007/978-94-007-0641-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Methods for Counterterrorism ent://SD_ILS/0/SD_ILS:189900 2024-11-01T02:57:47Z 2024-11-01T02:57:47Z Author&#160;Argamon, Shlomo. editor.&#160;Howard, Newton. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01141-2">http://dx.doi.org/10.1007/978-3-642-01141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>