Data editing -- Computer programs : A data scientist's guide to acquiring, cleaning and managing data in R / by Samuel Buttrey, Naval Postgraduate School, California, United States, Lyn R. Whitaker, Naval Postgraduate School, California, United States
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Data encryption (Computer science) -- Malaysia -- Congresses : Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings / Ed Dawson, Serge Vaudenay (eds.)
Data encryption -- Congresses : Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext : Proceedings of a Workshop
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Data envelopment analysis -- Japan : Regional performance measurement and improvement : new developments and applications of data envelopment analysis / Soushi Suzuki, Peter Nijkamp