Search Results for Systems Analysis. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystems$002bAnalysis.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300? 2025-12-17T12:08:09Z Advanced Computational and Communication Paradigms Proceedings of ICACCP 2023 ent://SD_ILS/0/SD_ILS:528431 2025-12-17T12:08:09Z 2025-12-17T12:08:09Z Author&#160;Borah, Samarjeet. editor.&#160;Gandhi, Tapan K. editor.&#160;Piuri, Vincenzo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-4284-8">https://doi.org/10.1007/978-981-99-4284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technological Trends in the AI Economy International Review and Ways of Adaptation ent://SD_ILS/0/SD_ILS:527596 2025-12-17T12:08:09Z 2025-12-17T12:08:09Z Author&#160;Makarenko, Elena N. editor.&#160;Vovchenko, Natalia G. editor.&#160;Tishchenko, Evgeny N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-7411-3">https://doi.org/10.1007/978-981-19-7411-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Challenges of Software Verification ent://SD_ILS/0/SD_ILS:528145 2025-12-17T12:08:09Z 2025-12-17T12:08:09Z Author&#160;Arceri, Vincenzo. editor.&#160;Cortesi, Agostino. editor.&#160;Ferrara, Pietro. editor.&#160;Olliaro, Martina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9601-6">https://doi.org/10.1007/978-981-19-9601-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1 ent://SD_ILS/0/SD_ILS:529010 2025-12-17T12:08:09Z 2025-12-17T12:08:09Z Author&#160;Singh, Yashwant. editor.&#160;Singh, Pradeep Kumar. editor.&#160;Kolekar, Maheshkumar H. editor.&#160;Kar, Arpan Kumar. editor.&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Explainable AI for Cybersecurity ent://SD_ILS/0/SD_ILS:528936 2025-12-17T12:08:09Z 2025-12-17T12:08:09Z Author&#160;Pan, Zhixin. author.&#160;Mishra, Prabhat. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-46479-9">https://doi.org/10.1007/978-3-031-46479-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:538768 2025-12-17T12:08:09Z 2025-12-17T12:08:09Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 S34 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2025-12-17T12:08:09Z 2025-12-17T12:08:09Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>