Search Results for Data Encryption. - Narrowed by: Computer System Implementation.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSystem$002bImplementation.$002509Computer$002bSystem$002bImplementation.$0026ps$003d300?dt=list2024-12-20T05:56:17ZInformation Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346162024-12-20T05:56:17Z2024-12-20T05:56:17ZAuthor Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Guide to Cloud Computing Principles and Practiceent://SD_ILS/0/SD_ILS:3310222024-12-20T05:56:17Z2024-12-20T05:56:17ZAuthor Hill, Richard. author. Hirsch, Laurie. author. Lake, Peter. author. Moshiri, Siavash. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331022.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>