Search Results for Running. - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dRunning.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list
2026-03-29T23:26:48Z
Enterprise, Business-Process and Information Systems Modeling 26th International Conference, BPMDS 2025, and 30th International Conference, EMMSAD 2025, Vienna, Austria, June 16-17, 2025, Proceedings
ent://SD_ILS/0/SD_ILS:608923
2026-03-29T23:26:48Z
2026-03-29T23:26:48Z
Author Guizzardi, Renata. editor. (orcid)0000-0002-5804-5741 Pufahl, Luise. editor. (orcid)0000-0002-5182-2587 Sturm, Arnon. editor. (orcid)0000-0002-4021-7752 van der Aa, Han. editor. (orcid)0000-0002-4200-4937 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-95397-2">https://doi.org/10.1007/978-3-031-95397-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-03-29T23:26:48Z
2026-03-29T23:26:48Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>