Search Results for Authentication. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAuthentication.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?dt=list
2026-04-10T22:39:27Z
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
BIOMETRIC TECHNOLOGY AND AUTHENTICATION biocryptography, and cloud-based architecture.
ent://SD_ILS/0/SD_ILS:562997
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Das, Ravindra.<br/>Preferred Shelf Number TK7882 .B56<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562146">https://www.taylorfrancis.com/books/9781003562146</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A beginner's guide to Internet of things security : attacks, applications, authentication, and fundamentals
ent://SD_ILS/0/SD_ILS:591322
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Gupta, B. B., 1982- author. Tewari, Aakanksha, author.<br/>Preferred Shelf Number QA76.9 .A25 G86 2020 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003001126">https://www.taylorfrancis.com/books/9781003001126</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Mechanics of user identification and authentication : fundamentals of identity management
ent://SD_ILS/0/SD_ILS:539940
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Todorov, Dobromir., author.<br/>Preferred Shelf Number TK5105.59 .T575 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia Watermarking Latest Developments and Trends
ent://SD_ILS/0/SD_ILS:602650
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Kumar Sahu, Aditya. editor. (orcid)0000-0003-4257-0688 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-9803-6">https://doi.org/10.1007/978-981-99-9803-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Losing the cybersecurity war : and what we can do to stop it
ent://SD_ILS/0/SD_ILS:590788
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author King, Steve (Cybersecurity expert), author. Chaudry, Kiren, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003331773">https://www.taylorfrancis.com/books/9781003331773</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in smart homes : architectures, solutions and technologies
ent://SD_ILS/0/SD_ILS:597626
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for wireless sensor networks using identity-based cryptography
ent://SD_ILS/0/SD_ILS:544612
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Preferred Shelf Number QA76.9 .A25 P38 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security in Distributed, Grid, Mobile, and Pervasive Computing.
ent://SD_ILS/0/SD_ILS:544847
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Preferred Shelf Number QA76.9<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes : the guide to secrecy from ancient to modern times
ent://SD_ILS/0/SD_ILS:546062
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number QA76.9 .A25 M67 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Securing e-business applications and communications
ent://SD_ILS/0/SD_ILS:545821
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Held, Jonathan S., author. Bowers, John R.<br/>Preferred Shelf Number QA76.9 .A25 H435 2001<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secure computers and networks : analysis, design, and implementation
ent://SD_ILS/0/SD_ILS:540568
2026-04-10T22:39:27Z
2026-04-10T22:39:27Z
Author Fisch, Eric A. White, Gregory B.<br/>Preferred Shelf Number QA76.9 .A25 F5334 2000<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>