Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Cryptography.
Author
Include
Exclude
Boura, Christina, editor.
(2)
Naya-Plasencia, Maria, editor.
(2)
Prouff, Emmanuel, editor.
(2)
Anand, R. S., author.
(1)
Arun, Jai Singh, author.
(1)
Bray, Shannon, 1972-
(1)
Bruen, Aiden A., 1941-
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
David, Shiblin, author.
(1)
Diffie, Whitfield, writer of foreword.
(1)
Forcinito, Mario, 1962-
(1)
Harishankar, Ray, author.
(1)
Jeyakrishnan, V., author.
(1)
Jin, Jennifer.
(1)
Kamhoua, Charles A., edtior.
(1)
Knight, Alissa, author.
(1)
Niranjanamurthy, M., author.
(1)
Njilla, Laurent L., editor.
(1)
O'Flynn, Colin, editor.
(1)
O'Flynn, Colin.
(1)
Quade, Phil.
(1)
Renault, Guenael, editor.
(1)
Renault, Guenael.
(1)
Rivain, Mattieu, editor.
(1)
Rivain, Mattieu.
(1)
Rjaibi, Walid, author.
(1)
Shetty, Sachin, editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2020
(3)
2019
(2)
2023
(2)
2025
(2)
2005
(1)
2021
(1)
2024
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Security.
(9)
COMPUTERS.
(8)
Electronic books.
(7)
Computer security.
(6)
Sécurité informatique.
(6)
Cryptographie.
(5)
COMPUTERS -- Security -- Cryptography & Encryption.
(3)
Chiffrement (Informatique)
(3)
Computer Security
(3)
Data encryption (Computer science)
(3)
COMPUTERS -- Security -- General.
(2)
Cryptography
(2)
31.48 calculus of variations.
(1)
53.71 information, communication and signal theories.
(1)
54.10 theoretical informatics.
(1)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
Blockchains (Databases)
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- Cryptography.
(1)
Chaînes de blocs.
(1)
Computer security
(1)
Computers
(1)
Computers.
(1)
Computersicherheit
(1)
Computersicherheit -- Theoretische Informatik.
(1)
Criptologia.
(1)
Data protection.
(1)
Fehlerkorrekturcode
(1)
Fehlerkorrigierender Code.
(1)
Hacking
(1)
Hacking.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Information theory.
(1)
Informationstheorie -- 0 Gesamtdarstellung.
(1)
Informatique quantique.
(1)
Internet auctions -- Security measures.
(1)
Kryptologie
(1)
Kryptologie -- 0 Gesamtdarstellung.
(1)
Optimization.
(1)
Ordinateurs.
(1)
Penetration testing (Computer security)
(1)
Piratage informatique.
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Quantum computing.
(1)
Secret code.
(1)
Systèmes de télécommunications -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications.
(1)
Telecommunication systems
(1)
Telecommunication systems -- Security measures
(1)
Telecommunication systems -- Security measures.
(1)
Telecommunication systems.
(1)
Telekommunikation
(1)
Teoria da informação.
(1)
Tests d'intrusion.
(1)
Theoretische Informatik -- Computersicherheit.
(1)
Transport -- Sécurité -- Mesures.
(1)
Transportation -- Security measures.
(1)
Vente aux enchères sur Internet -- Sécurité -- Mesures.
(1)
Véhicules autonomes -- Sécurité -- Mesures.
(1)
Véhicules autonomes.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Cryptography, information theory, and error-correction : a handbook for the 21st century
Cryptography, information theory, and error-correction : a handbook for the 21st century
Author
Bruen, Aiden A., 1941- Forcinito, Mario, 1962-
Preferred Shelf Number
QA76.9 .A25 B79 2005
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2