Search Results for Organizations - Narrowed by: Data encryption (Computer science).
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dOrganizations$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?dt=list
2026-03-14T05:44:41Z
Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:616229
2026-03-14T05:44:41Z
2026-03-14T05:44:41Z
Author Chang, Victor. editor. Ramachandran, Muthu. editor. Walters, Robert J. editor. Wills, Gary. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems - CHES 2017 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:611609
2026-03-14T05:44:41Z
2026-03-14T05:44:41Z
Author Fischer, Wieland. editor. Homma, Naofumi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-66787-4">https://doi.org/10.1007/978-3-319-66787-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Animal Biometrics Techniques and Applications
ent://SD_ILS/0/SD_ILS:612758
2026-03-14T05:44:41Z
2026-03-14T05:44:41Z
Author Kumar, Santosh. author. Singh, Sanjay Kumar. author. Singh, Rishav. author. Singh, Amit Kumar. author. (orcid)0000-0001-7359-2068 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7956-6">https://doi.org/10.1007/978-981-10-7956-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building the Infrastructure for Cloud Security A Solutions View
ent://SD_ILS/0/SD_ILS:618624
2026-03-14T05:44:41Z
2026-03-14T05:44:41Z
Author Yeluri, Raghuram. author. Castro-Leon, Enrique. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6146-9">https://doi.org/10.1007/978-1-4302-6146-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
10 Don'ts on Your Digital Devices The Non-Techie's Survival Guide to Cyber Security and Privacy
ent://SD_ILS/0/SD_ILS:618639
2026-03-14T05:44:41Z
2026-03-14T05:44:41Z
Author Rzeszut, Eric. author. Bachrach, Daniel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4842-0367-5">https://doi.org/10.1007/978-1-4842-0367-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value
ent://SD_ILS/0/SD_ILS:618599
2026-03-14T05:44:41Z
2026-03-14T05:44:41Z
Author Dennedy, Michelle. author. Fox, Jonathan. author. Finneran, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records
ent://SD_ILS/0/SD_ILS:618605
2026-03-14T05:44:41Z
2026-03-14T05:44:41Z
Author Robichau, Bernard Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>