Search Results for Operations Management. - Narrowed by: Data Encryption. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dOperations$002bManagement.$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300? 2024-10-02T19:47:54Z Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense ent://SD_ILS/0/SD_ILS:23424 2024-10-02T19:47:54Z 2024-10-02T19:47:54Z Yazar&#160;Heckman, Kristin E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25133-2">http://dx.doi.org/10.1007/978-3-319-25133-2</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:20643 2024-10-02T19:47:54Z 2024-10-02T19:47:54Z Yazar&#160;Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23609 2024-10-02T19:47:54Z 2024-10-02T19:47:54Z Yazar&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:23735 2024-10-02T19:47:54Z 2024-10-02T19:47:54Z Yazar&#160;Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/> Communication Networks for Smart Grids Making Smart Grid Real ent://SD_ILS/0/SD_ILS:19519 2024-10-02T19:47:54Z 2024-10-02T19:47:54Z Yazar&#160;Budka, Kenneth C. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6302-2">http://dx.doi.org/10.1007/978-1-4471-6302-2</a><br/>Format:&#160;Electronic Resources<br/>