Arama Sonuçları Electronic data processing. - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dElectronic$002bdata$002bprocessing.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?2024-11-02T07:16:59ZProgress in Cryptology – AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346202024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Youssef, Amr. editor. Nitaj, Abderrahmane. editor. Hassanien, Aboul Ella. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(334620.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Understanding High-Dimensional Spacesent://SD_ILS/0/SD_ILS:1973682024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Skillicorn, David B. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-33398-9">http://dx.doi.org/10.1007/978-3-642-33398-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975802024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Lei, Jingsheng. editor. Wang, Fu Lee. editor. Li, Mo. editor. Luo, Yuan. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Modeling Decisions for Artificial Intelligence 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975332024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Torra, Vicenç. editor. Narukawa, Yasuo. editor. López, Beatriz. editor. Villaret, Mateu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34620-0">http://dx.doi.org/10.1007/978-3-642-34620-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Degunking Windows 7ent://SD_ILS/0/SD_ILS:2934312024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Ballew, Joli.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/degunking-windows-7">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Oracle RMAN 11g backup and recoveryent://SD_ILS/0/SD_ILS:2933082024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Freeman, Robert G., 1965- Hart, Matthew.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-rman-11g-backup-recovery">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital rights management : an introductionent://SD_ILS/0/SD_ILS:3655872024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Satish, D., 1977-<br/>Yer Numarası KK2655.6 D54 2007<br/>Format: Kitap<br/>Durum Hukuk Kütüphanesi~1<br/>Digital data integrity the evolution from passive protection to active managementent://SD_ILS/0/SD_ILS:2967322024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Little, David B. Farmer, Skip. El-Hilali, Oussama.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=20460">http://www.books24x7.com/marc.asp?bookid=20460</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470035184">http://dx.doi.org/10.1002/9780470035184</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=83896&ref=toc">http://www.myilibrary.com?id=83896&ref=toc</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The CISO handbook a practical guide to securing your companyent://SD_ILS/0/SD_ILS:2904162024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Gentile, Michael. Collette, Ronald D. August, Thomas D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-11-02T07:16:59Z2024-11-02T07:16:59ZYazar Kairab, Sudhanshu.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>