Search Results for - Narrowed by: Data protection. - IGI Global.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dAUTHOR$002509Author$002509IGI$002bGlobal.$002509IGI$002bGlobal.$0026ps$003d300?2024-06-07T14:23:56ZCollaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152024-06-07T14:23:56Z2024-06-07T14:23:56Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:22613192024-06-07T14:23:56Z2024-06-07T14:23:56Zby Tsolis, Dimitrios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-118-6</a><br/>Format: Electronic Resources<br/>Techniques and applications for advanced information privacy and security emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:22619692024-06-07T14:23:56Z2024-06-07T14:23:56Zby Nemati, Hamid R., 1958-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7</a><br/>Format: Electronic Resources<br/>Cyber-security and global information assurance threat analysis and response solutionsent://SD_ILS/0/SD_ILS:22612722024-06-07T14:23:56Z2024-06-07T14:23:56Zby Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format: Electronic Resources<br/>Multimedia forensics and securityent://SD_ILS/0/SD_ILS:22617922024-06-07T14:23:56Z2024-06-07T14:23:56Zby Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-869-7</a><br/>Format: Electronic Resources<br/>Social implications of data mining and information privacy interdisciplinary frameworks and solutionsent://SD_ILS/0/SD_ILS:22619172024-06-07T14:23:56Z2024-06-07T14:23:56Zby Eyob, Ephrem, 1954-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-196-4</a><br/>Format: Electronic Resources<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:22611032024-06-07T14:23:56Z2024-06-07T14:23:56Zby Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format: Electronic Resources<br/>Managing information assurance in financial servicesent://SD_ILS/0/SD_ILS:22617382024-06-07T14:23:56Z2024-06-07T14:23:56Zby Rao, H. R. (H. Raghav)<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1</a><br/>Format: Electronic Resources<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:22618532024-06-07T14:23:56Z2024-06-07T14:23:56Zby Yee, George.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-914-4</a><br/>Format: Electronic Resources<br/>