Search Results for Cryptography -- History. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography$002b--$002bHistory.$0026ps$003d300?dt=list 2026-03-22T17:43:33Z History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms ent://SD_ILS/0/SD_ILS:400424 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Dooley, John F. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age ent://SD_ILS/0/SD_ILS:603456 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Kestner, Peter. author. (orcid)0009-0002-0437-9487&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes, Cryptology and Information Security 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520866 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;El Hajji, Said. editor.&#160;Mesnager, Sihem. editor.&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33017-9">https://doi.org/10.1007/978-3-031-33017-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secret history the story of cryptology ent://SD_ILS/0/SD_ILS:567958 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Bauer, Craig P., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315162539">https://www.taylorfrancis.com/books/9781315162539</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Bray, Shannon, 1972-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unveiling Dynamics and Complexity 13th Conference on Computability in Europe, CiE 2017, Turku, Finland, June 12-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616309 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Kari, Jarkko. editor.&#160;Manea, Florin. editor.&#160;Petre, Ion. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58741-7">https://doi.org/10.1007/978-3-319-58741-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:617822 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Ryan, Peter Y. A. editor.&#160;Naccache, David. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pursuit of the Universal 12th Conference on Computability in Europe, CiE 2016, Paris, France, June 27 - July 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616953 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Beckmann, Arnold. editor.&#160;Bienvenu, Laurent. editor.&#160;Jonoska, Nata&scaron;a. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40189-8">https://doi.org/10.1007/978-3-319-40189-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Discrete Mathematics An Accessible Introduction to the History, Theory, Logic and Applications ent://SD_ILS/0/SD_ILS:617503 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;O'Regan, Gerard. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44561-8">https://doi.org/10.1007/978-3-319-44561-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519134 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Katz, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46447-2">https://doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518386 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Bishop, Matt. editor.&#160;Miloslavskaya, Natalia. editor.&#160;Theocharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18500-2">https://doi.org/10.1007/978-3-319-18500-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Bauer, Craig P.<br/>Preferred Shelf Number&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook of finite fields ent://SD_ILS/0/SD_ILS:541762 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Mullen, Gary L.&#160;Panario, Daniel, 1959-<br/>Preferred Shelf Number&#160;QA247.3 .M854 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439873823">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:544089 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Kraft, James S., eauthor.&#160;Washington, Lawrence C., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA241<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482214420">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The history of information security a comprehensive handbook ent://SD_ILS/0/SD_ILS:145532 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Leeuw, Karl de.&#160;Bergstra, J. A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The history of information security a comprehensive handbook ent://SD_ILS/0/SD_ILS:112205 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Leeuw, Karl de.&#160;Bergstra, J. A.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RSA and public-key cryptography ent://SD_ILS/0/SD_ILS:543985 2026-03-22T17:43:33Z 2026-03-22T17:43:33Z Author&#160;Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number&#160;QA268 .M655 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420035247">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>