Search Results for Johnson. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dJohnson.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-01-27T07:46:07Z Managing Information Risk and the Economics of Security ent://SD_ILS/0/SD_ILS:164782 2026-01-27T07:46:07Z 2026-01-27T07:46:07Z Author&#160;Johnson, M. Eric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Financial and Medical Identity Theft ent://SD_ILS/0/SD_ILS:174049 2026-01-27T07:46:07Z 2026-01-27T07:46:07Z Author&#160;Camp, L. Jean. author.&#160;Johnson, M. Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1918-1">http://dx.doi.org/10.1007/978-1-4614-1918-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers ent://SD_ILS/0/SD_ILS:187061 2026-01-27T07:46:07Z 2026-01-27T07:46:07Z Author&#160;Camenisch, Jan L. editor.&#160;Collberg, Christian S. editor.&#160;Johnson, Neil F. editor.&#160;Sallee, Phil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187766 2026-01-27T07:46:07Z 2026-01-27T07:46:07Z Author&#160;Zhang, Hongke. editor.&#160;Olariu, Stephan. editor.&#160;Cao, Jiannong. editor.&#160;Johnson, David B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions ent://SD_ILS/0/SD_ILS:596265 2026-01-27T07:46:07Z 2026-01-27T07:46:07Z Author&#160;Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number&#160;HD61.5 .M66 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-01-27T07:46:07Z 2026-01-27T07:46:07Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>