Search Results for Complexity. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComplexity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2026-02-21T09:44:34Z
Trust, complexity and control confidence in a convergent world
ent://SD_ILS/0/SD_ILS:297521
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Cofta, Piotr.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0745/2007015560-b.html">http://catdir.loc.gov/catdir/enhancements/fy0745/2007015560-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470517857">http://dx.doi.org/10.1002/9780470517857</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/123232368.html">http://catalog.hathitrust.org/api/volumes/oclc/123232368.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Preferred Shelf Number QA76.9 .A25 N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P76 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Combinatorial Algorithms 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400703
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Brankovic, Ljiljana. editor. (orcid)0000-0002-5056-4627 Ryan, Joe. editor. (orcid)0000-0002-7781-0306 Smyth, William F. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78825-8">https://doi.org/10.1007/978-3-319-78825-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysis
ent://SD_ILS/0/SD_ILS:398995
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Nakahara Jr., Jorge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Combinatorial Algorithms 29th International Workshop, IWOCA 2018, Singapore, July 16–19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400158
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Iliopoulos, Costas. editor. Leong, Hon Wai. editor. Sung, Wing-Kin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94667-2">https://doi.org/10.1007/978-3-319-94667-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Software – ICMS 2018 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400160
2026-02-21T09:44:34Z
2026-02-21T09:44:34Z
Author Davenport, James H. editor. (orcid)0000-0002-3982-7545 Kauers, Manuel. editor. Labahn, George. editor. Urban, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-96418-8">https://doi.org/10.1007/978-3-319-96418-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>