Search ResultsElektronik Kaynaklar 
by
Giwah, Anthony Duke, author.
Format:
Alıntı:
Empirical Assessment of Mobile Device Users' Information Security Behavior Towards Data Breach
by
Ahmed, Faraz, author.
Format:
Alıntı:
Performance Analysis and Privacy Protection of Network Data / Ahmed, Faraz, author.
by
Gemignani, Michael C. Legal protection of software.
Format:
Alıntı:
Legal protection of software: a survey / M.C. Gemignani --Algorithms for public key cryptosystems
by
Noutoua, Jean Sylvestre, author.
Format:
Alıntı:
-attacks and data breaches because of the high value data that they host. Social security numbers, credit card
by
Yovits, M. C. (Marshall Clinton)
Format:
Alıntı:
Team Size on Effort: COPMO; 9. Early Size Prediction; 10. Conclusion; Appendix. Description of Data
by
Lazakidou, Athina A.
Format:
Alıntı:
National Identity Creation in Virtual Communities and Social Media -- E-Government and Data Protection in

Eylem Seç





