Search Results for Base. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBase.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026te$003dILS$0026ps$003d300?dt=list 2026-03-25T09:09:11Z Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-03-25T09:09:11Z 2026-03-25T09:09:11Z Author&#160;Bray, Shannon, 1972-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611592 2026-03-25T09:09:11Z 2026-03-25T09:09:11Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Feistel Ciphers Security Proofs and Cryptanalysis ent://SD_ILS/0/SD_ILS:612651 2026-03-25T09:09:11Z 2026-03-25T09:09:11Z Author&#160;Nachef, Valerie. author.&#160;Patarin, Jacques. author.&#160;Volte, Emmanuel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49530-9">https://doi.org/10.1007/978-3-319-49530-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611549 2026-03-25T09:09:11Z 2026-03-25T09:09:11Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:618581 2026-03-25T09:09:11Z 2026-03-25T09:09:11Z Author&#160;Nayak, Umesha. author.&#160;Rao, Umesh Hodeghatta. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithmic cryptanalysis ent://SD_ILS/0/SD_ILS:546057 2026-03-25T09:09:11Z 2026-03-25T09:09:11Z Author&#160;Joux, Antoine., author.<br/>Preferred Shelf Number&#160;QA76.9 .A43 J693 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420070033">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>