Arama Sonuçları Informatique. - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformatique.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2026-01-22T12:42:07ZInnovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4024012026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar M. F. Kebe, Cheikh. editor. Gueye, Assane. editor. Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building effective privacy programs : cybersecurity from principles to practiceent://SD_ILS/0/SD_ILS:6001112026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .P735 E34 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25 E3884 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data quality : empowering businesses with analytics and AIent://SD_ILS/0/SD_ILS:5981552026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Southekal, Prashanth H., author.<br/>Yer Numarası HF5548.2 .S687 2023 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and privacy in the Internet of things : architectures, techniques, and applicationsent://SD_ILS/0/SD_ILS:5971842026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Awad, Ali Ismail, editor. Abawajy, Jemal H., 1982- editor.<br/>Yer Numarası TK5105.8857 .S444 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Executive's guide to cyber risk : securing the future todayent://SD_ILS/0/SD_ILS:5975672026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Moyo, Siegfried, author.<br/>Yer Numarası HF5548.37 .M68 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisionsent://SD_ILS/0/SD_ILS:5962652026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Moore, Richard O., III, 1971- author.<br/>Yer Numarası HD61.5 .M66 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and its challenges in the 21st Centuryent://SD_ILS/0/SD_ILS:5970772026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Guerrier, Claudine, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tribe of hackers : cybersecurity advice from the best hackers in the worldent://SD_ILS/0/SD_ILS:5954182026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C37 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital identities in tension : between autonomy and controlent://SD_ILS/0/SD_ILS:5953202026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Khatchatourov, Armen, author. Chardel, Pierre-Antoine, collaborator. Feenberg, Andrew, collaborator. Périès, Gabriel, collaborator.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119629610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119629610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:5937212026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Song, Houbing, editor. Fink, Glenn A., editor. Jeschke, Sabina, editor.<br/>Yer Numarası TK5105.59 .S43923 2018<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography, information theory, and error-correction : a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:5930442026-01-22T12:42:07Z2026-01-22T12:42:07ZYazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Yer Numarası QA76.9 .A25 B79 2005<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>