Search Results for - Narrowed by: Information Storage and Retrieval. - Data protection. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Information$002bStorage$002band$002bRetrieval.$002509Information$002bStorage$002band$002bRetrieval.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300? 2024-05-30T15:26:50Z Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502827 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503839 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Database Security Applications and Trends ent://SD_ILS/0/SD_ILS:501583 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Preserving Data Mining Models and Algorithms ent://SD_ILS/0/SD_ILS:501661 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Aggarwal, Charu C. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503481 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/> Information Networking. Towards Ubiquitous Networking and Services International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503815 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Vaz&atilde;o, Teresa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89524-4">http://dx.doi.org/10.1007/978-3-540-89524-4</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503543 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79576-6">http://dx.doi.org/10.1007/978-3-540-79576-6</a><br/>Format:&#160;Electronic Resources<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:505647 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512440 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513007 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512430 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;LaMarca, Anthony. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72037-9">http://dx.doi.org/10.1007/978-3-540-72037-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512922 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512107 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512125 2024-05-30T15:26:50Z 2024-05-30T15:26:50Z by&#160;Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format:&#160;Electronic Resources<br/>