Data editing -- Computer programs : A data scientist's guide to acquiring, cleaning and managing data in R / by Samuel Buttrey, Naval Postgraduate School, California, United States, Lyn R. Whitaker, Naval Postgraduate School, California, United States
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Data encryption (Computer science) -- Malaysia -- Congresses : Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings / Ed Dawson, Serge Vaudenay (eds.)
Data encryption -- Congresses : Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext : Proceedings of a Workshop
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Data envelopment analysis -- Computer programs : Data envelopment analysis with GAMS : a handbook on productivity analysis and performance measurement / Ali Emrouznejad, Konstantinos Petridis, Vincent Charles
2023
1
Data envelopment analysis -- Congresses : Advances in the theory and applications of performance measurement and management : proceedings of DEA45—International Conference on Data Envelopment Analysis / Ali Emrouznejad, Emmanuel Thanassoulis, Mehdi Toloo, editors
Data envelopment analysis -- Japan : Regional performance measurement and improvement : new developments and applications of data envelopment analysis / Soushi Suzuki, Peter Nijkamp