Search Results for - Narrowed by: Data protection. - Conti, Mauro. editor. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dAUTHOR$002509Author$002509Conti$00252C$002bMauro.$002beditor.$002509Conti$00252C$002bMauro.$002beditor.$0026ps$003d300? 2024-05-26T04:42:30Z Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:2084292 2024-05-26T04:42:30Z 2024-05-26T04:42:30Z by&#160;Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Threat Intelligence ent://SD_ILS/0/SD_ILS:2084503 2024-05-26T04:42:30Z 2024-05-26T04:42:30Z by&#160;Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-05-26T04:42:30Z 2024-05-26T04:42:30Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/>