Arama Sonu&ccedil;lar&#305; Data protection. - Daralt&#305;lm&#305;&#351;: Criminology. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Konu$002509Criminology.$002509Criminology.$0026ps$003d300? 2024-11-02T03:34:44Z Data Protection in a Profiled World ent://SD_ILS/0/SD_ILS:205340 2024-11-02T03:34:44Z 2024-11-02T03:34:44Z Yazar&#160;Gutwirth, Serge. editor.&#160;Poullet, Yves. editor.&#160;De Hert, Paul. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-90-481-8865-9">http://dx.doi.org/10.1007/978-90-481-8865-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computers, Privacy and Data Protection: an Element of Choice ent://SD_ILS/0/SD_ILS:205901 2024-11-02T03:34:44Z 2024-11-02T03:34:44Z Yazar&#160;Gutwirth, Serge. editor.&#160;Poullet, Yves. editor.&#160;De Hert, Paul. editor.&#160;Leenes, Ronald. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-94-007-0641-5">http://dx.doi.org/10.1007/978-94-007-0641-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Methods for Counterterrorism ent://SD_ILS/0/SD_ILS:189900 2024-11-02T03:34:44Z 2024-11-02T03:34:44Z Yazar&#160;Argamon, Shlomo. editor.&#160;Howard, Newton. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01141-2">http://dx.doi.org/10.1007/978-3-642-01141-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>