Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Electronic books.
Author
Include
Exclude
Stamp, Mark.
(3)
Wiley InterScience (Online service)
(3)
Alder, Raven.
(2)
Cole, Eric.
(2)
Konheim, Alan G., 1934-
(2)
Long, Johnny.
(2)
Ring, Sandra.
(2)
Taylor and Francis.
(2)
Abbadi, Imad M., author.
(1)
Adams, Randee.
(1)
Ahmad, David R. Mirza.
(1)
Amini, Rob.
(1)
Andress, Jason.
(1)
Andrés, Steven.
(1)
Baskin, Brian.
(1)
Bauer, Eric.
(1)
Bayles, Aaron W.
(1)
Beale, Jay.
(1)
Brindley, Ed.
(1)
Brotby, W. Krag.
(1)
Burnett, Mark (Mark M.)
(1)
Craig, Paul.
(1)
Cross, Michael, 1965-
(1)
Danielyan, Edgar.
(1)
Davies, Joshua A. (Joshua Aaron)
(1)
Dorf, Richard C., author.
(1)
Dorf, Richard C., editor.
(1)
Douligeris, C. (Christos)
(1)
Dube, Roger.
(1)
Dubrawsky, Ido.
(1)
Fair, Ted.
(1)
Foster, James C.
(1)
Hancock, Bill, 1957-
(1)
Honick, Ron.
(1)
Hunter, Laura E.
(1)
Hurley, Chris.
(1)
IGI Global, publisher.
(1)
Institute of Electrical and Electronics Engineers.
(1)
Jacobs, Stuart.
(1)
Khan, Muhammad Salman, author.
(1)
Kissell, Joe.
(1)
Knipp, Eric.
(1)
Krause, Micki.
(1)
Lewis, T. G. (Theodore Gyle), 1941-
(1)
Low, Richard M., 1967-
(1)
Maynor, David.
(1)
Moeller, Robert R.
(1)
Mookhey, K. K.
(1)
Mullen, Timothy M.
(1)
Nordfelt, Michael.
(1)
Piltzecker, Tony, 1975-
(1)
Porter, Thomas.
(1)
Quigley, Marian.
(1)
Rima, Chris.
(1)
Rittinghouse, John W.
(1)
Rountree, Derrick.
(1)
Rozenblit, Moshe, 1944-
(1)
Russell, Ryan, 1969-
(1)
Shinder, Debra Littlejohn.
(1)
Simmons, Gustavus J.
(1)
Sisalem, Dorgham.
(1)
Snedaker, Susan.
(1)
Tipton, Harold F.
(1)
Tittel, Ed.
(1)
Touhill, C. J., 1938- author.
(1)
Touhill, Gregory J., author.
(1)
Ulsch, N. MacDonnell, 1951-
(1)
Vacca, John R.
(1)
Wall, David.
(1)
Wyler, Neil R.
(1)
XYPRO Technology Corporation.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(43)
Publication Date
Include
Exclude
-
2006
(8)
2005
(7)
2007
(7)
2011
(4)
2014
(4)
2002
(3)
2004
(3)
2009
(3)
2010
(3)
2019
(2)
1992
(1)
2000
(1)
2003
(1)
2008
(1)
2012
(1)
2013
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer security.
(30)
Computer networks -- Security measures.
(23)
Cryptography.
(4)
Computer crimes -- Prevention.
(3)
Computer hackers.
(3)
Data encryption (Computer science)
(3)
Data protection.
(3)
Information technology -- Security measures.
(3)
Cloud computing.
(2)
Computer crimes.
(2)
Electronic book collection.
(2)
Internet -- Security measures.
(2)
Acquisition of computer software.
(1)
Biomedical engineering.
(1)
Biosensing Techniques.
(1)
Biosensores.
(1)
Biosensors.
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Computer networks -- Security measures.
(1)
COMPUTERS -- Computer Engineering.
(1)
COMPUTERS -- Hardware -- General.
(1)
COMPUTERS -- Internet -- Security.
(1)
COMPUTERS -- Machine Theory.
(1)
COMPUTERS -- Networking -- Security.
(1)
COMPUTERS -- Security -- General.
(1)
COMPUTERS / Software Development & Engineering / General.
(1)
Cisco Systems, Inc.
(1)
Civil defense -- United States.
(1)
Client/server computing -- Security measures.
(1)
Computabilidade e modelos de computacao.
(1)
Computer crimes -- Fiction.
(1)
Computer crimes -- Investigation -- Handbooks, manuals, etc.
(1)
Computer engineering.
(1)
Computer hackers -- Fiction.
(1)
Computer hackers -- Psychology -- Fiction.
(1)
Computer hackers -- Psychology.
(1)
Computer input-output equipment.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Management.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks -- Security measures -- United States.
(1)
Computer science.
(1)
Computer security -- Computer programs.
(1)
Computer security -- Data processing.
(1)
Computer security -- Equipment and supplies.
(1)
Computer security -- Fiction.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security -- Management -- Handbooks, manuals, etc.
(1)
Computer security -- Management.
(1)
Computer security -- United States -- Planning.
(1)
Computer software -- Quality control.
(1)
Computer software -- Reliability.
(1)
Computers -- Access control.
(1)
Corporations -- Security measures.
(1)
Crisis management.
(1)
Cryptographie.
(1)
Data protection -- Handbooks, manuals, etc.
(1)
Database security.
(1)
Databescherming.
(1)
Digital electronics.
(1)
Electronic data processing departments -- Auditing.
(1)
Electronic data processing departments -- Security measures.
(1)
Electronics, Medical -- Instrumentation.
(1)
Electrónica médica.
(1)
Ethiek.
(1)
Forensic sciences -- Handbooks, manuals, etc.
(1)
Geheimschrift.
(1)
Génie logiciel.
(1)
Hashing (Computer science)
(1)
Hewlett-Packard computers -- Security measures.
(1)
Identity theft -- Fiction.
(1)
Identity theft.
(1)
Informatiebeleid.
(1)
Information resources management.
(1)
Information technology -- Auditing.
(1)
Information technology -- Moral and ethical aspects.
(1)
Information technology -- Social aspects.
(1)
Ingeniería biomédica.
(1)
Internet telephony -- Security measures.
(1)
Internet.
(1)
Mac OS.
(1)
Machine learning.
(1)
Macintosh (Computer) -- Programming.
(1)
Management information systems -- Security measures.
(1)
Medical electronics.
(1)
Microsoft Windows server.
(1)
Nanotechnology.
(1)
Open source software.
(1)
Operating systems (Computers)
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
Ordinateurs -- Conception et construction.
(1)
Session Initiation Protocol (Computer network protocol)
(1)
Short stories.
(1)
Software engineering.
(1)
Spyware (Computer software)
(1)
Systèmes informatiques -- Mesures de sûreté.
(1)
Sécurité informatique.
(1)
TECHNOLOGY & ENGINEERING / Electronics / General.
(1)
TECHNOLOGY & ENGINEERING / Quality Control.
(1)
Technology -- Social aspects.
(1)
Telecommunication -- Security measures.
(1)
Telecommunication systems -- Security measures.
(1)
Telecommunication.
(1)
Terrorism -- Government policy -- United States.
(1)
Terrorism -- United States -- Prevention.
(1)
Télécommunications, Systèmes de -- Sécurité -- Mesures.
(1)
Veiligheidspolitiek.
(1)
Web services.
(1)
Web sites -- Security measures.
(1)
Wireless LANs.
(1)
Électronique numérique.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
CRC Ebooks
Electronic Library
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
49 Results Found
1
2
3
4
5
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
49.
Contemporary cryptology the science of information integrity
Contemporary cryptology the science of information integrity
Author
Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.
Preferred Shelf Number
ONLINE
Electronic Access
IEEE Xplore
http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
4
5
Go to:
Search Results
|
Top of Page
|
Search Facets