Search Results for REFERENCE -- General. - Narrowed by: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dREFERENCE$002b--$002bGeneral.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?2026-05-14T04:41:57ZElements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:6178232026-05-14T04:41:57Z2026-05-14T04:41:57ZAuthor Alani, Mohammed M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:6107882026-05-14T04:41:57Z2026-05-14T04:41:57ZAuthor Colbert, Edward J. M. editor. Kott, Alexander. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>