Search Results for Informatique. - Narrowed by: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformatique.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?2026-01-22T04:19:47ZInnovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4024012026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor M. F. Kebe, Cheikh. editor. Gueye, Assane. editor. Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building effective privacy programs : cybersecurity from principles to practiceent://SD_ILS/0/SD_ILS:6001112026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .P735 E34 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data quality : empowering businesses with analytics and AIent://SD_ILS/0/SD_ILS:5981552026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Southekal, Prashanth H., author.<br/>Preferred Shelf Number HF5548.2 .S687 2023 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:5975672026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Moyo, Siegfried, author.<br/>Preferred Shelf Number HF5548.37 .M68 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy in the Internet of things : architectures, techniques, and applicationsent://SD_ILS/0/SD_ILS:5971842026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Awad, Ali Ismail, editor. Abawajy, Jemal H., 1982- editor.<br/>Preferred Shelf Number TK5105.8857 .S444 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:5962652026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number HD61.5 .M66 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and its challenges in the 21st Centuryent://SD_ILS/0/SD_ILS:5970772026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Guerrier, Claudine, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital identities in tension : between autonomy and controlent://SD_ILS/0/SD_ILS:5953202026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Khatchatourov, Armen, author. Chardel, Pierre-Antoine, collaborator. Feenberg, Andrew, collaborator. Périès, Gabriel, collaborator.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119629610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119629610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:5954182026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:5937212026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Song, Houbing, editor. Fink, Glenn A., editor. Jeschke, Sabina, editor.<br/>Preferred Shelf Number TK5105.59 .S43923 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography, information theory, and error-correction : a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:5930442026-01-22T04:19:47Z2026-01-22T04:19:47ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Preferred Shelf Number QA76.9 .A25 B79 2005<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>