Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Cryptography.
Author
Include
Exclude
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Grimes, Roger A., author.
(3)
Jin, Jennifer, author.
(2)
Jin, Jennifer.
(2)
Prouff, Emmanuel, editor.
(2)
Taylor and Francis.
(2)
Alencar, Marcelo S., 1957- author.
(1)
An, Jianpin, author.
(1)
Anand, R. S., author.
(1)
Arun, Jai Singh, author.
(1)
Baliyan, Anupam, 1976- author.
(1)
Baş, Esra, author.
(1)
Bray, Shannon, 1972-
(1)
Bruen, Aiden A., 1941-
(1)
Bullock, Jessey, author.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Chowdhury, Rajdeep, editor.
(1)
Couretas, Jerry M., 1966- author.
(1)
David, Shiblin, author.
(1)
Dhanaraj, Rajesh Kumar, editor.
(1)
Dhatterwal, Jagjit Singh, author.
(1)
Diffie, Whitfield, writer of foreword.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Edwards, Jason, author.
(1)
Forcinito, Mario, 1962-
(1)
Fréminville, Marie de, author.
(1)
Furneaux, Nick, author.
(1)
Gjosteen, Kristian.
(1)
Gordon, Adam, author.
(1)
Guerrier, Claudine, author.
(1)
Harishankar, Ray, author.
(1)
Hook, David, 1962-
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Hwang, Seong Oun, author.
(1)
Jeyakrishnan, V., author.
(1)
John Wiley & Sons, publisher.
(1)
Kahn, David, eauthor.
(1)
Kamhoua, Charles A., edtior.
(1)
Kaswan, Kuldeep Singh, author.
(1)
Katz, Jonathan, author.
(1)
Keren.
(1)
Kim, Intae, author.
(1)
Knight, Alissa, author.
(1)
Knottenbelt, William J., writer of foreword.
(1)
Kumar, Keshav (Engineer), editor.
(1)
Lambros, Kyriakos P., author.
(1)
Lee, Wai Kong, author.
(1)
Li, Hu, author.
(1)
Mammeri, Zoubir, author.
(1)
Menezes, Alfred J., author.
(1)
Mkadmi, Abderrazak, author.
(1)
Moschovitis, Christos J. P., author.
(1)
Niranjan, S. K., editor.
(1)
Niranjanamurthy, M., author.
(1)
Njilla, Laurent L., editor.
(1)
O'Flynn, Colin, editor.
(1)
O'Flynn, Colin.
(1)
Oka, Dennis Kengo, author.
(1)
Pandey, Bishwajeet, editor.
(1)
Quade, Phil.
(1)
Rani, Shalli, author.
(1)
Renault, Guenael, editor.
(1)
Renault, Guenael.
(1)
Rivain, Mattieu, editor.
(1)
Rivain, Mattieu.
(1)
Rjaibi, Walid, author.
(1)
Robinson, Nikki, author.
(1)
Sharp, Matthew K., author.
(1)
Shetty, Sachin, editor.
(1)
Tanner, Nadean H., author.
(1)
Tounsi, Wiem, editor.
(1)
Tyagi, Amit Kumar, editor.
(1)
Upadhyaya, Prashant A., author.
(1)
Vanstone, Scott A., author.
(1)
Wang, Han, author.
(1)
van Oorschot, Paul C., author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(49)
Publication Date
Include
Exclude
-
2025
(10)
2021
(7)
2019
(6)
2020
(6)
2022
(5)
2024
(5)
2005
(2)
2017
(2)
2018
(2)
2026
(2)
1997
(1)
2014
(1)
2023
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(34)
Security.
(34)
COMPUTERS.
(32)
Computer security.
(23)
Sécurité informatique.
(22)
Computer Security
(10)
Networking.
(9)
COMPUTERS -- Security -- General.
(7)
Cryptographie.
(7)
Data encryption (Computer science)
(7)
Computer security
(6)
COMPUTERS -- Security -- Cryptography & Encryption.
(5)
COMPUTERS / Cryptography
(5)
Computer networks -- Security measures.
(5)
Data protection.
(5)
COMPUTERS -- Security -- Cryptography.
(4)
Chiffrement (Informatique)
(4)
Cryptography
(4)
Hacking.
(4)
Informatique quantique.
(4)
Piratage informatique.
(4)
Protection de l'information (Informatique)
(4)
Quantum computing.
(4)
Blockchains (Databases)
(3)
Chaînes de blocs.
(3)
Computer networks -- Security measures
(3)
Computers
(3)
Computers.
(3)
Data protection
(3)
Hacking
(3)
Ordinateurs.
(3)
Quantum computing
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Viruses & Malware.
(3)
BUSINESS & ECONOMICS.
(2)
Business enterprises -- Security measures
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Internet -- Security.
(2)
COMPUTERS -- Networking -- Security.
(2)
COMPUTERS / Information Technology
(2)
COMPUTERS / Networking / Security
(2)
COMPUTERS / Security / General
(2)
Computers -- Access control.
(2)
Cybernetics.
(2)
Electronic digital computers
(2)
Electronic digital computers.
(2)
Entreprises -- Sécurité -- Mesures.
(2)
Penetration testing (Computer security)
(2)
Tests d'intrusion.
(2)
31.48 calculus of variations.
(1)
53.71 information, communication and signal theories.
(1)
54.10 theoretical informatics.
(1)
Architecture logicielle.
(1)
Archives
(1)
Archives.
(1)
Artificial satellites in telecommunication -- Security measures.
(1)
Assembly Language.
(1)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
Automotive computers -- Programming.
(1)
Automotive telematics -- Security measures.
(1)
BUSINESS & ECONOMICS -- Finance.
(1)
Behavioral cybersecurity.
(1)
Bibliothèques virtuelles.
(1)
Business -- Data processing -- Security measures
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
COMPUTERS / Artificial Intelligence
(1)
COMPUTERS / Computer Engineering
(1)
COMPUTERS / Operating Systems / General.
(1)
COMPUTERS / Programming / Systems Analysis & Design
(1)
COMPUTERS / Security / Cryptography.
(1)
COMPUTERS / Security / General.
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Chief information officers.
(1)
Cloud computing -- Security measures.
(1)
Computational intelligence -- Industrial applications.
(1)
Computer Science.
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computers -- Access control -- Handbooks, manuals, etc.
(1)
Computers -- Access control -- Testing
(1)
Computers -- Access control -- Testing.
(1)
Computersicherheit
(1)
Computersicherheit -- Theoretische Informatik.
(1)
Criminal investigation -- Technological innovations
(1)
Criminal investigation -- Technological innovations.
(1)
Criminalité informatique -- Enquêtes.
(1)
Criptologia.
(1)
Cryptography -- Handbooks, manuals, etc.
(1)
Cyberinfrastructure -- Security measures.
(1)
Data transmission systems -- Security measures.
(1)
Digital libraries
(1)
Digital libraries.
(1)
Distributed Systems & Computing.
(1)
Electronic commerce
(1)
Electronic funds transfers
(1)
Electronic funds transfers -- Corrupt practices
(1)
Electronic funds transfers -- Corrupt practices.
(1)
Electronic intelligence.
(1)
Enquêtes criminelles -- Innovations.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Fehlerkorrekturcode
(1)
Fehlerkorrigierender Code.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Gestion du risque.
(1)
Hackers
(1)
Hackers.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Industry 5.0.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information technology -- Security measures
(1)
Information technology -- Security measures -- Management.
(1)
Information technology -- Security measures.
(1)
Information theory.
(1)
Informationstheorie -- 0 Gesamtdarstellung.
(1)
Insurance.
(1)
Intelligence (AI) & Semantics.
(1)
Internet auctions -- Security measures.
(1)
Internet des objets -- Sécurité -- Mesures.
(1)
Internet of things -- Industrial applications.
(1)
Internet of things -- Security measures.
(1)
Java (Computer program language)
(1)
Kryptologie
(1)
Kryptologie -- 0 Gesamtdarstellung.
(1)
MATHEMATICS / Applied
(1)
MATHEMATICS / Linear Programming
(1)
Management information systems -- Security measures.
(1)
Military intelligence.
(1)
Mobile & Wireless Communications.
(1)
Online Safety & Privacy.
(1)
Optical Data Processing.
(1)
Optimization.
(1)
Ordinateurs de bord -- Programmation.
(1)
POLITICAL SCIENCE / Political Freedom & Security / International Security.
(1)
Pirates informatiques.
(1)
Programming Languages.
(1)
Public key infrastructure (Computer security)
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Records
(1)
Records.
(1)
Reverse engineering.
(1)
Risk Assessment & Management.
(1)
Risk management
(1)
Risk management.
(1)
Rétro-ingénierie.
(1)
Satellites artificiels dans les télécommunications -- Sécurité -- Mesures.
(1)
Secret code.
(1)
Signals & Signal Processing.
(1)
Software architecture.
(1)
Systems Architecture.
(1)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY & ENGINEERING.
(1)
TECHNOLOGY / Electricity
(1)
TECHNOLOGY / Electronics / General
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures.
(1)
Technologie de l'information.
(1)
Telecommunication systems
(1)
Telecommunication systems -- Security measures
(1)
Telecommunication systems -- Security measures.
(1)
Telecommunication systems.
(1)
Telekommunikation
(1)
Teoria da informação.
(1)
Theoretische Informatik -- Computersicherheit.
(1)
Transferts électroniques de fonds -- Pratiques déloyales.
(1)
Transport -- Sécurité -- Mesures.
(1)
Transportation -- Security measures.
(1)
Télématique automobile -- Sécurité -- Mesures.
(1)
Vente aux enchères sur Internet -- Sécurité -- Mesures.
(1)
Véhicules autonomes -- Sécurité -- Mesures.
(1)
Véhicules autonomes.
(1)
World War, 1939-1945 -- Cryptography.
(1)
World War, 1939-1945 -- Electronic intelligence.
(1)
World War, 1939-1945 -- Military intelligence.
(1)
X86 assembly language (Computer program language)
(1)
X86 assembly language (Langage de programmation)
(1)
information technology.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
49 Results Found
1
2
3
4
5
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
49.
Cryptography, information theory, and error-correction : a handbook for the 21st century
Cryptography, information theory, and error-correction : a handbook for the 21st century
Author
Bruen, Aiden A., 1941- Forcinito, Mario, 1962-
Preferred Shelf Number
QA76.9 .A25 B79 2005
Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
5
Go to:
Search Results
|
Top of Page
|
Search Facets