Search Results for Reader. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dReader.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-03-22T19:32:41Z Handbook of Trustworthy Federated Learning ent://SD_ILS/0/SD_ILS:604998 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Thai, My T. editor. (orcid)0000-0003-0503-2012&#160;Phan, Hai N. editor.&#160;Thuraisingham, Bhavani. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58923-2">https://doi.org/10.1007/978-3-031-58923-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enigma Myth Deciphered Codebreakers, Commanders and Politicians ent://SD_ILS/0/SD_ILS:605945 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Grajek, Marek. author. (orcid)0009-0009-5526-4197&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65475-6">https://doi.org/10.1007/978-3-031-65475-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The AI Act and The Agile Safety Plan ent://SD_ILS/0/SD_ILS:607067 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Myklebust, Thor. author. (orcid)0000-0002-9283-092X&#160;St&aring;lhane, Tor. author.&#160;Vatn, Dorthea Mathilde Kristin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80504-2">https://doi.org/10.1007/978-3-031-80504-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities Includes selected Papers from International Conference on Advanced Computing &amp; Next-Generation Communication (ICACNGC 2022) ent://SD_ILS/0/SD_ILS:602934 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Abd El-Latif, Ahmed A. editor.&#160;Tawalbeh, Lo'ai. editor.&#160;Maleh, Yassine. editor. (orcid)0000-0003-4704-5364&#160;Gupta, Brij B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51097-7">https://doi.org/10.1007/978-3-031-51097-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing IT Service Security Methods and Recipes for User Organizations and Providers Along the Supply Chain ent://SD_ILS/0/SD_ILS:603666 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;von Faber, Eberhard. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55533-6">https://doi.org/10.1007/978-3-031-55533-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Challenges and Approaches in Internet of Things ent://SD_ILS/0/SD_ILS:615231 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Misra, Sridipta. author.&#160;Maheswaran, Muthucumaru. author.&#160;Hashmi, Salman. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44230-3">https://doi.org/10.1007/978-3-319-44230-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:613138 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor.&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:617853 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Mayes, Keith. editor.&#160;Markantonakis, Konstantinos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Digital Forensics A Concise and Practical Introduction ent://SD_ILS/0/SD_ILS:617855 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;K&auml;vrestad, Joakim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67450-6">https://doi.org/10.1007/978-3-319-67450-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:618045 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Borges de Oliveira, F&aacute;bio. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40718-0">https://doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:611588 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Akhgar, Babak. editor.&#160;Bayerl, P. Saskia. editor.&#160;Sampson, Fraser. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Network Analysis in Predictive Policing Concepts, Models and Methods ent://SD_ILS/0/SD_ILS:611926 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Tayebi, Mohammad A. author.&#160;Gl&auml;sser, Uwe. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41492-8">https://doi.org/10.1007/978-3-319-41492-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:618581 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Nayak, Umesha. author.&#160;Rao, Umesh Hodeghatta. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Degunking Windows 7 ent://SD_ILS/0/SD_ILS:293431 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Ballew, Joli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/degunking-windows-7">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle RMAN 11g backup and recovery ent://SD_ILS/0/SD_ILS:293308 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Freeman, Robert G., 1965-&#160;Hart, Matthew.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-rman-11g-backup-recovery">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle data guard 11g handbook ent://SD_ILS/0/SD_ILS:293374 2026-03-22T19:32:41Z 2026-03-22T19:32:41Z Author&#160;Carpenter, Larry.&#160;Meeks, Joseph.&#160;Kim, Charles.&#160;Burke, Bill.&#160;Carothers, Sonya.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-data-guard-11g-handbook">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>