Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Cryptography.
Author
Include
Exclude
SpringerLink (Online service)
(3)
Carey, Marcus J. (Cybersecurity professional), author.
(2)
Grimes, Roger A., author.
(2)
Jin, Jennifer.
(2)
Bray, Shannon, 1972-
(1)
Bullock, Jessey, author.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Colbert, Edward J. M. editor.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Felderer, Michael. editor.
(1)
Gordon, Adam, author.
(1)
Großmann, Jürgen. editor.
(1)
Jin, Jennifer, author.
(1)
John Wiley & Sons, publisher.
(1)
Knight, Alissa, author.
(1)
Kott, Alexander. editor.
(1)
Oka, Dennis Kengo, author.
(1)
Prasad, Munaga V.N.K. author.
(1)
Rao, Channapragada Rama Seshagiri. author.
(1)
Seehusen, Fredrik. editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2020
(4)
2017
(3)
2016
(2)
2021
(2)
2019
(1)
2025
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(9)
Security.
(9)
COMPUTERS.
(8)
Computer security.
(7)
Sécurité informatique.
(7)
COMPUTERS -- Security -- Cryptography & Encryption.
(4)
Computer Security
(3)
Computer security
(3)
Cryptology.
(3)
Data encryption (Computer science).
(3)
Data protection.
(3)
Hacking
(3)
Hacking.
(3)
Piratage informatique.
(3)
COMPUTERS -- Security -- General.
(2)
Computer Communication Networks.
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures.
(2)
Computer networks .
(2)
Data and Information Security.
(2)
Networking.
(2)
Penetration testing (Computer security)
(2)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(2)
Tests d'intrusion.
(2)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
Automotive computers -- Programming.
(1)
Automotive telematics -- Security measures.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
Chiffrement (Informatique)
(1)
Computer vision.
(1)
Computers
(1)
Computers -- Access control -- Testing
(1)
Computers -- Access control -- Testing.
(1)
Computers.
(1)
Control Structures and Microprogramming.
(1)
Cryptographie.
(1)
Cryptography
(1)
Cybernetics.
(1)
Data encryption (Computer science)
(1)
Electronic data processing -- Management.
(1)
Electronic digital computers
(1)
Electronic digital computers.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Hackers
(1)
Hackers.
(1)
IT Operations.
(1)
Information technology -- Security measures -- Management.
(1)
Microprogramming .
(1)
Multimedia Information Systems.
(1)
Multimedia systems.
(1)
Ordinateurs de bord -- Programmation.
(1)
Ordinateurs.
(1)
Pirates informatiques.
(1)
Protection de l'information (Informatique)
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Software engineering.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Télématique automobile -- Sécurité -- Mesures.
(1)
Véhicules autonomes -- Sécurité -- Mesures.
(1)
Véhicules autonomes.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
1:SPRINGER
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Digital Watermarking Techniques in Curvelet and Ridgelet Domain
Digital Watermarking Techniques in Curvelet and Ridgelet Domain
Author
Rao, Channapragada Rama Seshagiri. author. Prasad, Munaga V.N.K. author. SpringerLink (Online service)
Preferred Shelf Number
ONLINE
Electronic Access
https://doi.org/10.1007/978-3-319-32951-2
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2