Search Results for Informatique. - Narrowed by: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformatique.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2026-01-22T18:28:23ZInnovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4024012026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor M. F. Kebe, Cheikh. editor. Gueye, Assane. editor. Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building effective privacy programs : cybersecurity from principles to practiceent://SD_ILS/0/SD_ILS:6001112026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .P735 E34 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data quality : empowering businesses with analytics and AIent://SD_ILS/0/SD_ILS:5981552026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Southekal, Prashanth H., author.<br/>Preferred Shelf Number HF5548.2 .S687 2023 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy in the Internet of things : architectures, techniques, and applicationsent://SD_ILS/0/SD_ILS:5971842026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Awad, Ali Ismail, editor. Abawajy, Jemal H., 1982- editor.<br/>Preferred Shelf Number TK5105.8857 .S444 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:5975672026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Moyo, Siegfried, author.<br/>Preferred Shelf Number HF5548.37 .M68 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:5962652026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number HD61.5 .M66 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and its challenges in the 21st Centuryent://SD_ILS/0/SD_ILS:5970772026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Guerrier, Claudine, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital identities in tension : between autonomy and controlent://SD_ILS/0/SD_ILS:5953202026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Khatchatourov, Armen, author. Chardel, Pierre-Antoine, collaborator. Feenberg, Andrew, collaborator. Périès, Gabriel, collaborator.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119629610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119629610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:5954182026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:5937212026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Song, Houbing, editor. Fink, Glenn A., editor. Jeschke, Sabina, editor.<br/>Preferred Shelf Number TK5105.59 .S43923 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography, information theory, and error-correction : a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:5930442026-01-22T18:28:23Z2026-01-22T18:28:23ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Preferred Shelf Number QA76.9 .A25 B79 2005<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>