Search Results for Technology age - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTechnology$002bage$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-04-12T16:19:47Z
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-04-12T16:19:47Z
2026-04-12T16:19:47Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Large Language Models in Cybersecurity Threats, Exposure and Mitigation
ent://SD_ILS/0/SD_ILS:603753
2026-04-12T16:19:47Z
2026-04-12T16:19:47Z
Author Kucharavy, Andrei. editor. Plancherel, Octave. editor. Mulder, Valentin. editor. Mermoud, Alain. editor. Lenders, Vincent. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-54827-7">https://doi.org/10.1007/978-3-031-54827-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>