Search Results for Computer network architectures - Narrowed by: Data Encryption.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetwork$002barchitectures$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026te$003dILS$0026ps$003d300?
2026-01-27T22:03:22Z
Guide to Cloud Computing Principles and Practice
ent://SD_ILS/0/SD_ILS:331022
2026-01-27T22:03:22Z
2026-01-27T22:03:22Z
Author Hill, Richard. author. Hirsch, Laurie. author. Lake, Peter. author. Moshiri, Siavash. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331022.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2026-01-27T22:03:22Z
2026-01-27T22:03:22Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>