Search Results for Electronic data processing. - Narrowed by: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dElectronic$002bdata$002bprocessing.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?2024-12-13T20:51:56ZProgress in Cryptology – AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346202024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Youssef, Amr. editor. Nitaj, Abderrahmane. editor. Hassanien, Aboul Ella. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334620.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Understanding High-Dimensional Spacesent://SD_ILS/0/SD_ILS:1973682024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Skillicorn, David B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33398-9">http://dx.doi.org/10.1007/978-3-642-33398-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Degunking Windows 7ent://SD_ILS/0/SD_ILS:2934312024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/degunking-windows-7">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Modeling Decisions for Artificial Intelligence 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975332024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Torra, Vicenç. editor. Narukawa, Yasuo. editor. López, Beatriz. editor. Villaret, Mateu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34620-0">http://dx.doi.org/10.1007/978-3-642-34620-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975802024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Lei, Jingsheng. editor. Wang, Fu Lee. editor. Li, Mo. editor. Luo, Yuan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle RMAN 11g backup and recoveryent://SD_ILS/0/SD_ILS:2933082024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Freeman, Robert G., 1965- Hart, Matthew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-rman-11g-backup-recovery">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital data integrity the evolution from passive protection to active managementent://SD_ILS/0/SD_ILS:2967322024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Little, David B. Farmer, Skip. El-Hilali, Oussama.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=20460">http://www.books24x7.com/marc.asp?bookid=20460</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470035184">http://dx.doi.org/10.1002/9780470035184</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=83896&ref=toc">http://www.myilibrary.com?id=83896&ref=toc</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital rights management : an introductionent://SD_ILS/0/SD_ILS:3655872024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Satish, D., 1977-<br/>Preferred Shelf Number KK2655.6 D54 2007<br/>Format: Books<br/>Availability Law Library~1<br/>The CISO handbook a practical guide to securing your companyent://SD_ILS/0/SD_ILS:2904162024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Gentile, Michael. Collette, Ronald D. August, Thomas D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-12-13T20:51:56Z2024-12-13T20:51:56ZAuthor Kairab, Sudhanshu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>