Works matching DE "DATA protection software"
1
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 305, doi. 10.1049/iet-ifs.2017.0046
- Bai, Kunpeng;
- Wu, Chuankun;
- Zhang, Zhenfeng
- Article
2
- 2022
- Knoke, Friederike;
- Nwankwo, Iheanyi
- Report
3
- 2023
- and Communication Networks, Security
- Correction Notice
4
- Webology, 2014, v. 11, n. 2, p. 1
- Article
5
- Document News, 2012, v. 30, n. 3, p. 12
- Article
7
- I-com, 2025, v. 24, n. 1, p. 159, doi. 10.1515/icom-2024-0064
- Kiss, Lennart;
- Sellung, Rachelle
- Article
8
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 53, doi. 10.1002/jcaf.20706
- Burnett, Royce D.;
- Friedman, Mark;
- Rodriguez, Ramon P.
- Article
9
- Telecommunication Engineering, 2014, v. 54, n. 7, p. 990, doi. 10.3969/j.issn.1001-893x.2014.07.023
- YAN Fang;
- XIE Wen-guang;
- ZHAO Chang-xiao;
- WANG Peng
- Article
11
- LPI Contribution, 2021, p. 1
- Arvidson, L. E.;
- Politte, D. V.;
- Scholes, D.
- Article
12
- El Profesional de la Información, 2012, v. 21, n. 5, p. 537, doi. 10.3145/epi.2012.sep.14
- Sánchez-Montero, José-Antonio;
- Melgar-Estrada, Liliana M.;
- De-Stefano-Convit, Gabriella
- Article
13
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4150660
- Article
14
- International Policy Digest, 2017, v. 4, n. 5, p. 37
- Article
15
- Security & Communication Networks, 2015, v. 8, n. 7, p. 1213, doi. 10.1002/sec.1075
- Zhu, Hui;
- Lin, Xiaodong;
- Zhang, Yun;
- Lu, Rongxing
- Article
16
- Industrial Management, 1995, v. 37, n. 2, p. 27
- Article
17
- Telemedicine & e-Health, 2024, v. 30, n. 12, p. 2815, doi. 10.1089/tmj.2024.0192
- Abberger, Birgit;
- Grauer, Tom;
- Kieselbach, Kristin
- Article
18
- Scalable Computing: Practice & Experience, 2025, v. 26, n. 3, p. 1300, doi. 10.12694/scpe.v26i3.4210
- XIAOHUI ZHANG;
- SONGKUN JIAO;
- JUNFENG WANG;
- CUILEI YANG
- Article
19
- Educational Technology & Society, 2010, v. 13, n. 2, p. 1
- Article
20
- ISACA Journal, 2025, n. 2, p. 47
- Article
21
- CPA Journal, 2015, v. 85, n. 5, p. 58
- Article
23
- Multimedia Tools & Applications, 2012, v. 57, n. 1, p. 67, doi. 10.1007/s11042-010-0536-9
- Wang, Chuanjian;
- Peng, Zhiyong;
- Peng, Yuwei;
- Yu, Liang;
- Wang, Junzhou;
- Zhao, Qingzhan
- Article
24
- ITNOW, 2018, v. 60, n. 2, p. 42, doi. 10.1093/itnow/bwy050
- Article
25
- ITNOW, 2013, v. 55, n. 2, p. 30, doi. 10.1093/itnow/bwt013
- Article
26
- Journal of Health Care Compliance, 2016, v. 18, n. 3, p. 13
- Article
27
- Journal of Securities Operations & Custody, 2016, v. 8, n. 2, p. 96, doi. 10.69554/ezig5919
- Article