Search Results for Authentication. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAuthentication.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2026-02-20T16:40:55ZHacking multifactor authenticationent://SD_ILS/0/SD_ILS:5963262026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>BIOMETRIC TECHNOLOGY AND AUTHENTICATION biocryptography, and cloud-based architecture.ent://SD_ILS/0/SD_ILS:5629972026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Das, Ravindra.<br/>Preferred Shelf Number TK7882 .B56<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562146">https://www.taylorfrancis.com/books/9781003562146</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A beginner's guide to Internet of things security : attacks, applications, authentication, and fundamentalsent://SD_ILS/0/SD_ILS:5913222026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Gupta, B. B., 1982- author. Tewari, Aakanksha, author.<br/>Preferred Shelf Number QA76.9 .A25 G86 2020 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003001126">https://www.taylorfrancis.com/books/9781003001126</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:5441182026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Mechanics of user identification and authentication : fundamentals of identity managementent://SD_ILS/0/SD_ILS:5399402026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Todorov, Dobromir., author.<br/>Preferred Shelf Number TK5105.59 .T575 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Cyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography : algorithms, protocols, and standards for computer securityent://SD_ILS/0/SD_ILS:5989142026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Losing the cybersecurity war : and what we can do to stop itent://SD_ILS/0/SD_ILS:5907882026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor King, Steve (Cybersecurity expert), author. Chaudry, Kiren, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003331773">https://www.taylorfrancis.com/books/9781003331773</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless communication in cyber securityent://SD_ILS/0/SD_ILS:5987052026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Symmetric cryptography. Volume 1 : Design and security proofsent://SD_ILS/0/SD_ILS:5988032026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity in smart homes : architectures, solutions and technologiesent://SD_ILS/0/SD_ILS:5976262026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security issues and privacy concerns in Industry 4.0 applicationsent://SD_ILS/0/SD_ILS:5969452026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:5950992026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for wireless sensor networks using identity-based cryptographyent://SD_ILS/0/SD_ILS:5446122026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Preferred Shelf Number QA76.9 .A25 P38 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security in Distributed, Grid, Mobile, and Pervasive Computing.ent://SD_ILS/0/SD_ILS:5448472026-02-20T16:40:55Z2026-02-20T16:40:55ZPreferred Shelf Number QA76.9<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Codes : the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:5460622026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number QA76.9 .A25 M67 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Securing e-business applications and communicationsent://SD_ILS/0/SD_ILS:5458212026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Held, Jonathan S., author. Bowers, John R.<br/>Preferred Shelf Number QA76.9 .A25 H435 2001<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Secure computers and networks : analysis, design, and implementationent://SD_ILS/0/SD_ILS:5405682026-02-20T16:40:55Z2026-02-20T16:40:55ZAuthor Fisch, Eric A. White, Gregory B.<br/>Preferred Shelf Number QA76.9 .A25 F5334 2000<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>