Search Results for Concepts - Narrowed by: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dConcepts$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?2026-03-04T04:11:23ZNext generation data science and blockchain technology for Industry 5.0 : concepts and paradigmsent://SD_ILS/0/SD_ILS:6000502026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number T59.6 .N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchainent://SD_ILS/0/SD_ILS:5996502026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Li, Hu, author. Wang, Han, author.<br/>Preferred Shelf Number QA76.9 .B56 L5 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Lessons from the Frontlines : Insights from a Cybersecurity Career.ent://SD_ILS/0/SD_ILS:6004332026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Keren.<br/>Preferred Shelf Number XX(600433.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography : algorithms, protocols, and standards for computer securityent://SD_ILS/0/SD_ILS:5989142026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.ent://SD_ILS/0/SD_ILS:5992382026-03-04T04:11:23Z2026-03-04T04:11:23ZPreferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Blockchain for distributed systems securityent://SD_ILS/0/SD_ILS:5951462026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidenceent://SD_ILS/0/SD_ILS:5945302026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Furneaux, Nick, author. Knottenbelt, William J., writer of foreword.<br/>Preferred Shelf Number HV8079 .C65 F87 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireshark for security professionals : using Wireshark and the Metasploit Frameworkent://SD_ILS/0/SD_ILS:5934722026-03-04T04:11:23Z2026-03-04T04:11:23ZAuthor Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>