Search Results for - Narrowed by: Data Structures, Cryptology and Information Theory. - Data protection. - Information Storage and Retrieval.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Information$002bStorage$002band$002bRetrieval.$002509Information$002bStorage$002band$002bRetrieval.$0026ps$003d300?2024-06-20T23:57:08ZHandbook of Database Security Applications and Trendsent://SD_ILS/0/SD_ILS:5015832024-06-20T23:57:08Z2024-06-20T23:57:08Zby Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format: Electronic Resources<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:5056472024-06-20T23:57:08Z2024-06-20T23:57:08Zby Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>