Search Results for Computer science. - Narrowed by: Computer security. - Data encryption (Computer science) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ps$003d300? 2024-09-23T06:10:11Z Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:298025 2024-09-23T06:10:11Z 2024-09-23T06:10:11Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-09-23T06:10:11Z 2024-09-23T06:10:11Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2024-09-23T06:10:11Z 2024-09-23T06:10:11Z Author&#160;Bauer, Craig P.<br/>Preferred Shelf Number&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:285249 2024-09-23T06:10:11Z 2024-09-23T06:10:11Z Author&#160;Paul, Goutam.&#160;Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation SSH2 implementation securing data in motion ent://SD_ILS/0/SD_ILS:146275 2024-09-23T06:10:11Z 2024-09-23T06:10:11Z Author&#160;Liu, Dale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied cryptanalysis breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:249508 2024-09-23T06:10:11Z 2024-09-23T06:10:11Z Author&#160;Stamp, Mark.&#160;Low, Richard M., 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:284865 2024-09-23T06:10:11Z 2024-09-23T06:10:11Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>