Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Cryptography.
Author
Include
Exclude
SpringerLink (Online service)
(4)
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Grimes, Roger A., author.
(3)
Taylor and Francis.
(3)
Boura, Christina, editor.
(2)
Bruen, Aiden A., 1941-
(2)
Forcinito, Mario, 1962-
(2)
Jin, Jennifer, author.
(2)
Jin, Jennifer.
(2)
Konheim, Alan G., 1934-
(2)
Naya-Plasencia, Maria, editor.
(2)
Prouff, Emmanuel, editor.
(2)
Wayner, Peter, 1964-
(2)
Alavi, Sayed Ehsan. author.
(1)
Alencar, Marcelo S., 1957- author.
(1)
An, Jianpin, author.
(1)
Anand, R. S., author.
(1)
Assche, Gilles van .
(1)
Bair, John, author.
(1)
Baliyan, Anupam, 1976- author.
(1)
Banerjee, Santo, 1976-
(1)
Bibak, Khodakhast. author.
(1)
Bray, Shannon, 1972-
(1)
Bullock, Jessey, author.
(1)
Cao, Zhenfu.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Chowdhury, Rajdeep, editor.
(1)
Couretas, Jerry M., 1966- author.
(1)
Cusick, Thomas W., 1943-
(1)
Datta, Agni. author.
(1)
David, Shiblin, author.
(1)
Dhar, Pranab Kumar. author.
(1)
Dhatterwal, Jagjit Singh, author.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Edwards, Jason, author.
(1)
Fréminville, Marie de, author.
(1)
Furneaux, Nick, author.
(1)
Gordon, Adam, author.
(1)
Heiderich, Mario.
(1)
Hook, David, 1962-
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
IGI Global.
(1)
Institute of Electrical and Electronics Engineers.
(1)
Jeyakrishnan, V., author.
(1)
John Wiley & Sons, publisher.
(1)
Johnson, Simon.
(1)
Joux, Antoine., author.
(1)
Kahate, Atul.
(1)
Kahn, David, eauthor.
(1)
Kamhoua, Charles A., edtior.
(1)
Kaswan, Kuldeep Singh, author.
(1)
Katz, Jonathan, 1974-
(1)
Katz, Jonathan, author.
(1)
Kipper, Gregory., author.
(1)
Knight, Alissa, author.
(1)
Knottenbelt, William J., writer of foreword.
(1)
Kraft, James S., eauthor.
(1)
Kumar, Keshav (Engineer), editor.
(1)
Lambros, Kyriakos P., author.
(1)
Lindell, Yehuda.
(1)
Low, Richard M., 1967-
(1)
Mahdaliza Idrus, Sevia. author.
(1)
Mammeri, Zoubir, author.
(1)
Martin, Keith M.
(1)
Menezes, Alfred J., author.
(1)
Moldovyan, Alex.
(1)
Moldovyan, Nick., author.
(1)
Moschovitis, Christos J. P., author.
(1)
Mukhopadhyay, Debdeep, author.
(1)
Nagar, Atulya K. author.
(1)
Nemati, Hamid. author.
(1)
Niranjan, S. K., editor.
(1)
Niranjanamurthy, M., author.
(1)
Njilla, Laurent L., editor.
(1)
O'Flynn, Colin, editor.
(1)
O'Flynn, Colin.
(1)
Pandey, Bishwajeet, editor.
(1)
Patil, Harsh Kupwade., author.
(1)
Pei, Dingyi., author.
(1)
Pointcheval, David, editor.
(1)
Quade, Phil.
(1)
Rani, Shalli, author.
(1)
Renault, Guenael, editor.
(1)
Renault, Guenael.
(1)
Rivain, Mattieu, editor.
(1)
Rivain, Mattieu.
(1)
Robinson, Nikki, author.
(1)
Sadegh Amiri, Iraj. author.
(1)
Schneier, Bruce.
(1)
Sergienko, Alexander V.
(1)
Shandilya, Shishir Kumar. author.
(1)
Sharp, Matthew K., author.
(1)
Shavers, Brett, author.
(1)
Shetty, Sachin, editor.
(1)
Shimamura, Tetsuya. author.
(1)
Simmons, Gustavus J.
(1)
St. Denis, Tom.
(1)
Stamp, Mark.
(1)
Stănică, Pantelimon.
(1)
Subhra, Rajat, author.
(1)
Szygenda, Stephen A.
(1)
Tanner, Nadean H., author.
(1)
Tounsi, Wiem, editor.
(1)
Tyagi, Amit Kumar, editor.
(1)
Upadhyaya, Prashant A., author.
(1)
Vanstone, Scott A., author.
(1)
Washington, Lawrence C., author.
(1)
Weiss, Jason (Jason R.)
(1)
Wiley InterScience (Online service)
(1)
Yanai, Naoto. author.
(1)
Zolfaghari, Behrouz. author.
(1)
van Oorschot, Paul C., author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(71)
Publication Date
Include
Exclude
-
2025
(7)
2019
(6)
2020
(6)
2023
(5)
2024
(5)
2007
(4)
2015
(4)
2022
(4)
2005
(3)
2006
(3)
2009
(3)
2013
(3)
2021
(3)
2004
(2)
2010
(2)
2011
(2)
2012
(2)
2017
(2)
2018
(2)
1992
(1)
1996
(1)
1997
(1)
2002
(1)
2014
(1)
2016
(1)
2026
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(36)
Electronic books.
(32)
Security.
(29)
COMPUTERS.
(26)
Sécurité informatique.
(24)
Data encryption (Computer science)
(18)
Computer Security
(10)
Cryptographie.
(9)
Computer networks -- Security measures.
(8)
COMPUTERS -- Security -- General.
(7)
Computer security
(6)
Networking.
(6)
COMPUTERS -- Security -- Cryptography & Encryption.
(5)
Chiffrement (Informatique)
(5)
Cryptography
(5)
Data protection.
(5)
COMPUTERS -- Security -- Cryptography.
(4)
Cryptology.
(4)
Data encryption (Computer science).
(4)
Hacking.
(4)
Piratage informatique.
(4)
Computer networks -- Security measures
(3)
Computers
(3)
Computers.
(3)
Hacking
(3)
Ordinateurs.
(3)
Protection de l'information (Informatique)
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Telecommunication -- Security measures.
(3)
Telecommunication systems -- Security measures.
(3)
BUSINESS & ECONOMICS.
(2)
Business enterprises -- Security measures
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Internet -- Security.
(2)
COMPUTERS -- Networking -- Security.
(2)
COMPUTERS / Cryptography
(2)
Communications Engineering, Networks.
(2)
Computational intelligence.
(2)
Computer algorithms.
(2)
Criptologia.
(2)
Cybernetics.
(2)
Data protection
(2)
Electronic digital computers
(2)
Electronic digital computers.
(2)
Entreprises -- Sécurité -- Mesures.
(2)
Informatique quantique.
(2)
Internet.
(2)
Java (Computer program language)
(2)
Penetration testing (Computer security)
(2)
Quantum computing
(2)
Quantum computing.
(2)
Telecommunication.
(2)
Teoria da informação.
(2)
Tests d'intrusion.
(2)
Viruses & Malware.
(2)
31.48 calculus of variations.
(1)
53.71 information, communication and signal theories.
(1)
54.10 theoretical informatics.
(1)
Algebra, Boolean.
(1)
Algorithms.
(1)
Application software -- Development.
(1)
Architecture logicielle.
(1)
Artificial intelligence.
(1)
Artificial satellites in telecommunication -- Security measures.
(1)
Assembly Language.
(1)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
BUSINESS & ECONOMICS -- Finance.
(1)
Behavioral cybersecurity.
(1)
Bilgisayar Güvenliği.
(1)
Bilgisayar ağları -- Güvenlik önlemleri.
(1)
Blockchains (Databases)
(1)
Business -- Data processing -- Security measures
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
COMPUTERS / Artificial Intelligence
(1)
COMPUTERS / Computer Engineering
(1)
COMPUTERS / Information Technology
(1)
COMPUTERS / Networking / Security
(1)
COMPUTERS / Operating Systems / General.
(1)
COMPUTERS / Programming / Systems Analysis & Design
(1)
COMPUTERS / Security / Cryptography.
(1)
COMPUTERS / Security / General
(1)
COMPUTERS / Security / General.
(1)
Chaotic behavior in systems.
(1)
Chaînes de blocs.
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Chief information officers.
(1)
Ciphers.
(1)
Cloud computing -- Security measures.
(1)
Coding theory.
(1)
Combinatorial designs and configurations.
(1)
Computabilidade e modelos de computacao.
(1)
Computational intelligence -- Industrial applications.
(1)
Computational linguistics.
(1)
Computer Science.
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computer software -- Development.
(1)
Computers -- Access control -- Handbooks, manuals, etc.
(1)
Computers -- Access control -- Testing
(1)
Computers -- Access control -- Testing.
(1)
Computers -- Access control.
(1)
Computersicherheit
(1)
Computersicherheit -- Theoretische Informatik.
(1)
Criminal investigation -- Technological innovations
(1)
Criminal investigation -- Technological innovations.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptography -- Handbooks, manuals, etc.
(1)
Cyberinfrastructure -- Security measures.
(1)
Databescherming.
(1)
Digital watermarking.
(1)
Distributed Systems & Computing.
(1)
Electronic commerce
(1)
Electronic funds transfers
(1)
Electronic funds transfers -- Corrupt practices
(1)
Electronic funds transfers -- Corrupt practices.
(1)
Electronic intelligence.
(1)
Engineering -- Data processing.
(1)
Engineering mathematics.
(1)
Enquêtes criminelles -- Innovations.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Fehlerkorrekturcode
(1)
Fehlerkorrigierender Code.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Geheimschrift.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Gestion du risque.
(1)
Hackers
(1)
Hackers.
(1)
Hashing (Computer science)
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Industry 5.0.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information technology -- Security measures -- Management.
(1)
Information theory.
(1)
Informationstheorie -- 0 Gesamtdarstellung.
(1)
Insurance.
(1)
Intelligence (AI) & Semantics.
(1)
Internet auctions -- Security measures.
(1)
Internet des objets -- Sécurité -- Mesures.
(1)
Internet of things -- Industrial applications.
(1)
Internet of things -- Security measures.
(1)
Internet programming.
(1)
Kriptografi.
(1)
Kryptologie
(1)
Kryptologie -- 0 Gesamtdarstellung.
(1)
Laser.
(1)
Lasers.
(1)
MATHEMATICS / Combinatorics.
(1)
MATHEMATICS / Number Theory.
(1)
Management information systems -- Security measures.
(1)
Mathematical and Computational Engineering Applications.
(1)
Microwaves, RF Engineering and Optical Communications.
(1)
Military intelligence.
(1)
Mobile & Wireless Communications.
(1)
Number theory.
(1)
Online Safety & Privacy.
(1)
Optimization.
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
POLITICAL SCIENCE / Political Freedom & Security / International Security.
(1)
Pirates informatiques.
(1)
Programming Languages.
(1)
Public key infrastructure (Computer security)
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Quantum communication -- Security measures.
(1)
Quantum communication.
(1)
Reverse engineering.
(1)
Risk Assessment & Management.
(1)
Risk management
(1)
Risk management.
(1)
Rétro-ingénierie.
(1)
Satellites artificiels dans les télécommunications -- Sécurité -- Mesures.
(1)
Secret code.
(1)
Signal processing.
(1)
Signal, Speech and Image Processing.
(1)
Signals & Signal Processing.
(1)
Software architecture.
(1)
Synchronization.
(1)
Systems Architecture.
(1)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications.
(1)
Systèmes informatiques -- Mesures de sûreté.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY & ENGINEERING.
(1)
TECHNOLOGY / Electricity
(1)
TECHNOLOGY / Electronics / General
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Technologie de l'information.
(1)
Telecommunication systems
(1)
Telecommunication systems -- Security measures
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Wiley E-Book Collection
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
73 Results Found
1
..
3
4
5
6
7
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
73.
Contemporary cryptology the science of information integrity
Contemporary cryptology the science of information integrity
Author
Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.
Preferred Shelf Number
ONLINE
Electronic Access
IEEE Xplore
http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
3
4
5
6
7