Search Results for COMPUTERS. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCOMPUTERS.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300? 2026-01-20T19:12:53Z Safeguarding satellite communications : issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:600245 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;An, Jianpin, author.<br/>Preferred Shelf Number&#160;TK5104 .A53 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agility ent://SD_ILS/0/SD_ILS:600179 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Arun, Jai Singh, author.&#160;Harishankar, Ray, author.&#160;Rjaibi, Walid, author.&#160;Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number&#160;QA76.889<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation mechanism for data encryption ent://SD_ILS/0/SD_ILS:552326 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Kumar, Keshav (Engineer), editor.&#160;Pandey, Bishwajeet, editor.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003508632">https://www.taylorfrancis.com/books/9781003508632</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain ent://SD_ILS/0/SD_ILS:599650 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Li, Hu, author.&#160;Wang, Han, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 L5 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography 2 ent://SD_ILS/0/SD_ILS:599724 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Edwards, Jason, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lessons from the Frontlines : Insights from a Cybersecurity Career. ent://SD_ILS/0/SD_ILS:600433 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Keren.<br/>Preferred Shelf Number&#160;XX(600433.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:560055 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Ba&#351;, Esra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514190">https://www.taylorfrancis.com/books/9781003514190</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography. 1 ent://SD_ILS/0/SD_ILS:599697 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael.&#160;Rivain, Mattieu.&#160;O'Flynn, Colin.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigms ent://SD_ILS/0/SD_ILS:600050 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;T59.6 .N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Manuscrypt : designed for mankind - anthropocentric information security ent://SD_ILS/0/SD_ILS:579444 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Upadhyaya, Prashant A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527220">https://www.taylorfrancis.com/books/9781003527220</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing : a new era of computing ent://SD_ILS/0/SD_ILS:598188 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Kaswan, Kuldeep Singh, author.&#160;Dhatterwal, Jagjit Singh, author.&#160;Baliyan, Anupam, 1976- author.&#160;Rani, Shalli, author.<br/>Preferred Shelf Number&#160;QA76.889 .K37 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157846">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394157846</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs ent://SD_ILS/0/SD_ILS:577899 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Chowdhury, Rajdeep, editor.&#160;Niranjan, S. K., editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:557931 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number&#160;TK5102.94 .A44 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum blockchain : an emerging cryptographic paradigm ent://SD_ILS/0/SD_ILS:597796 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Dhanaraj, Rajesh Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRACTICAL MATHEMATICAL CRYPTOGRAPHY ent://SD_ILS/0/SD_ILS:574057 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Gjosteen, Kristian.<br/>Preferred Shelf Number&#160;Z103<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003149422">https://www.taylorfrancis.com/books/9781003149422</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern cryptography with proof techniques and implementations. ent://SD_ILS/0/SD_ILS:577000 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Hwang, Seong Oun, author.&#160;Kim, Intae, author.&#160;Lee, Wai Kong, author.<br/>Preferred Shelf Number&#160;TK5102.94 .M63 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003152569">https://www.taylorfrancis.com/books/9781003152569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building secure cars : assuring the automotive software development lifecycle ent://SD_ILS/0/SD_ILS:596310 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Oka, Dennis Kengo, author.<br/>Preferred Shelf Number&#160;TL272.53 .O42 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Archives in the digital age : preservation and the right to be forgotten ent://SD_ILS/0/SD_ILS:596719 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Mkadmi, Abderrazak, author.<br/>Preferred Shelf Number&#160;CD973 .D53<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and its challenges in the 21st Century ent://SD_ILS/0/SD_ILS:597077 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Guerrier, Claudine, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto ent://SD_ILS/0/SD_ILS:595556 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Bray, Shannon, 1972-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C3673 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C368 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Applied Cryptography ent://SD_ILS/0/SD_ILS:546435 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Menezes, Alfred J., author.&#160;Katz, Jonathan, author.&#160;van Oorschot, Paul C., author.&#160;Vanstone, Scott A., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidence ent://SD_ILS/0/SD_ILS:594530 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Furneaux, Nick, author.&#160;Knottenbelt, William J., writer of foreword.<br/>Preferred Shelf Number&#160;HV8079 .C65 F87 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How i discovered World War II's greatest spy and other stories of intelligence and code ent://SD_ILS/0/SD_ILS:540734 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Kahn, David, eauthor.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;D810 .S7<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:144203 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Hook, David, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-01-20T19:12:53Z 2026-01-20T19:12:53Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Preferred Shelf Number&#160;QA76.9 .A25 B79 2005<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>