Search Results for Concepts. - Narrowed by: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dConcepts.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-04-06T10:20:05Z
Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigms
ent://SD_ILS/0/SD_ILS:600050
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number T59.6 .N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elements of Cloud Storage Security Concepts, Designs and Optimized Practices
ent://SD_ILS/0/SD_ILS:611448
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Galibus, Tatiana. author. Krasnoproshin, Viktor V. author. (orcid)0000-0002-9463-4869 de Oliveira Albuquerque, Robson. author. Pignaton de Freitas, Edison. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lessons from the Frontlines : Insights from a Cybersecurity Career.
ent://SD_ILS/0/SD_ILS:600433
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Keren.<br/>Preferred Shelf Number XX(600433.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Biometrics
ent://SD_ILS/0/SD_ILS:605790
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Jain, Anil K. author. Ross, Arun A. author. (orcid)0000-0001-8850-3013 Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725 Swearingen, Thomas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain
ent://SD_ILS/0/SD_ILS:599650
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Li, Hu, author. Wang, Han, author.<br/>Preferred Shelf Number QA76.9 .B56 L5 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Post-Quantum Signatures FALCON and SOLMAE with Python
ent://SD_ILS/0/SD_ILS:607260
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Kim, Kwangjo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-81250-7">https://doi.org/10.1007/978-3-031-81250-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners
ent://SD_ILS/0/SD_ILS:608948
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Guo, Fuchun. author. (orcid)0000-0001-6939-7710 Susilo, Willy. author. (orcid)0000-0002-1562-5105 Nguyen, Khoa. author. Chen, Xiaofeng. author. Zhao, Zhen. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fault-Tolerant Distributed Consensus in Synchronous Networks
ent://SD_ILS/0/SD_ILS:607763
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Choudhury, Ashish. author. Patra, Arpita. author. (orcid)0000-0002-8036-4407 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-80460-1">https://doi.org/10.1007/978-3-031-80460-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Computing and Quantum Machine Learning for Engineers and Developers
ent://SD_ILS/0/SD_ILS:610159
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Van Griensven Thé, Jesse. author. Fraser, Roydon Andrew. author. Rosas-Bustos, Jose. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-98245-3">https://doi.org/10.1007/978-3-031-98245-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
ent://SD_ILS/0/SD_ILS:603566
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Paar, Christof. author. Pelzl, Jan. author. Güneysu, Tim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-69007-9">https://doi.org/10.1007/978-3-662-69007-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cybersecurity A Multidisciplinary Challenge
ent://SD_ILS/0/SD_ILS:601841
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Sharp, Robin. author. (orcid)0000-0002-8593-267X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022
ent://SD_ILS/0/SD_ILS:601864
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Roy, Bimal Kumar. editor. Chaturvedi, Atul. editor. Tsaban, Boaz. editor. Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2229-1">https://doi.org/10.1007/978-981-99-2229-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2023
ent://SD_ILS/0/SD_ILS:603303
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Chaturvedi, Atul. editor. Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221 Roy, Bimal Kumar. editor. Tsaban, Boaz. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-0641-9">https://doi.org/10.1007/978-981-97-0641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Secure Networks, Blockchains and Smart Contract Technologies
ent://SD_ILS/0/SD_ILS:605174
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Chung, Jong-Moon. author. (orcid)0000-0002-1652-6635 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-65866-2">https://doi.org/10.1007/978-3-031-65866-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for distributed systems security
ent://SD_ILS/0/SD_ILS:595146
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidence
ent://SD_ILS/0/SD_ILS:594530
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Furneaux, Nick, author. Knottenbelt, William J., writer of foreword.<br/>Preferred Shelf Number HV8079 .C65 F87 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Animal Biometrics Techniques and Applications
ent://SD_ILS/0/SD_ILS:612758
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Kumar, Santosh. author. Singh, Sanjay Kumar. author. Singh, Rishav. author. Singh, Amit Kumar. author. (orcid)0000-0001-7359-2068 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7956-6">https://doi.org/10.1007/978-981-10-7956-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Security in SDN and NFV Challenges, Opportunities, and Applications
ent://SD_ILS/0/SD_ILS:613138
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Zhu, Shao Ying. editor. Scott-Hayward, Sandra. editor. Jacquin, Ludovic. editor. Hill, Richard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elements of Cloud Computing Security A Survey of Key Practicalities
ent://SD_ILS/0/SD_ILS:617823
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Alani, Mohammed M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The InfoSec Handbook An Introduction to Information Security
ent://SD_ILS/0/SD_ILS:618581
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Nayak, Umesha. author. Rao, Umesh Hodeghatta. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value
ent://SD_ILS/0/SD_ILS:618599
2026-04-06T10:20:05Z
2026-04-06T10:20:05Z
Author Dennedy, Michelle. author. Fox, Jonathan. author. Finneran, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>