Search Results for Authentication. - Narrowed by: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAuthentication.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?
2026-02-22T22:48:21Z
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Authentication codes and combinatorial designs
ent://SD_ILS/0/SD_ILS:547049
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Pei, Dingyi., author.<br/>Preferred Shelf Number QA76.9 .A25 P42 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Asymmetric cryptography : primitives and protocols
ent://SD_ILS/0/SD_ILS:598096
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Pointcheval, David, editor.<br/>Preferred Shelf Number QA76.9 .A25 A83 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for wireless sensor networks using identity-based cryptography
ent://SD_ILS/0/SD_ILS:544612
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Preferred Shelf Number QA76.9 .A25 P38 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Wireless security and cryptography : specifications and implementations
ent://SD_ILS/0/SD_ILS:543513
2026-02-22T22:48:21Z
2026-02-22T22:48:21Z
Author Sklavos, Nicolas. Zhang, Xinmiao.<br/>Preferred Shelf Number TK5103.2 .W57415 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>