Search Results for Cryptography. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-01-08T01:28:59Z
Introduction to modern cryptography
ent://SD_ILS/0/SD_ILS:364315
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Preferred Shelf Number QA76.9.A25 K36 2015<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Beginning cryptography with Java
ent://SD_ILS/0/SD_ILS:144203
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Elliptic Curve Cryptography
ent://SD_ILS/0/SD_ILS:236058
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Blake, Ian F.. Seroussi, Gadiel. Smart, Nigel P..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
The confluence of cryptography, blockchain and artificial intelligence
ent://SD_ILS/0/SD_ILS:566001
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Ankita. Nayancy. Verma, Rajat.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711515">https://www.taylorfrancis.com/books/9781032711515</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:483128
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Hofheinz, Dennis. editor. Rosen, Alon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486319
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Goldberg, Ian. editor. Moore, Tyler. editor. (orcid)0000-0002-8771-8191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483504
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Deng, Robert H. editor. (orcid)0000-0003-3491-8146 Gauthier-Umaña, Valérie. editor. (orcid)0000-0003-0909-7091 Ochoa, Martín. editor. (orcid)0000-0002-7816-5775 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483366
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:486060
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Hofheinz, Dennis. editor. Rosen, Alon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security
ent://SD_ILS/0/SD_ILS:399520
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Baldi, Marco. editor. (orcid)0000-0002-8754-5526 Quaglia, Elizabeth A. editor. Tomasin, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399957
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Meiklejohn, Sarah. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:400566
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Beimel, Amos. editor. Dziembowski, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401487
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Preneel, Bart. editor. (orcid)0000-0003-2005-9651 Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project
ent://SD_ILS/0/SD_ILS:401558
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Takagi, Tsuyoshi. editor. Wakayama, Masato. editor. Tanaka, Keisuke. editor. Kunihiro, Noboru. editor. Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399450
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Dinur, Itai. editor. Dolev, Shlomi. editor. Lodha, Sachin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:400334
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Beimel, Amos. editor. Dziembowski, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485776
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Joux, Antoine. editor. Youssef, Amr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488916
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Boureanu, Ioana. editor. Owesarski, Philippe. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488961
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Krawczyk, Hugo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488971
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Böhme, Rainer. editor. Brenner, Michael. editor. Moore, Tyler. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488975
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Lindell, Yehuda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488984
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Christin, Nicolas. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography
ent://SD_ILS/0/SD_ILS:489032
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Shi, Yun Q. editor. Liu, Feng. editor. Yan, Weiqi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487453
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Mosca, Michele. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visual Cryptography for Image Processing and Security Theory, Methods, and Applications
ent://SD_ILS/0/SD_ILS:487455
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Liu, Feng. author. Yan, Wei Qi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488136
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Kotulski, Zbigniew. editor. Ksiezopolski, Bogdan. editor. Mazur, Katarzyna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:484564
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Abdalla, Michel. editor. (orcid)0000-0002-2447-4329 De Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486893
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Cao, Zhenfu. editor. Zhang, Fangguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:486912
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Chakraborty, Rajat Subhra. editor. Matyas, Vashek. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489261
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Lange, Tanja. editor. Lauter, Kristin. editor. Lisoněk, Petr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for wireless sensor networks using identity-based cryptography
ent://SD_ILS/0/SD_ILS:544612
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Preferred Shelf Number QA76.9 .A25 P38 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:301860
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
The Hash Function BLAKE
ent://SD_ILS/0/SD_ILS:488367
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Aumasson, Jean-Philippe. author. Meier, Willi. author. Phan, Raphael C.-W. author. Henzen, Luca. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:542078
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Hinek, M. Jason., author.<br/>Preferred Shelf Number TK5102.94 .H56 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Blockchain technology for cyber defense, cybersecurity, and countermeasures : techniques, solutions, and applications
ent://SD_ILS/0/SD_ILS:570600
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Kshetri, Naresh, editor. Pandey, Purnendu Shekhar, editor. Ahmed, Mohiuddin (Computer scientist), editor.<br/>Preferred Shelf Number QA76.9 .A25 B5845 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003449515">https://www.taylorfrancis.com/books/9781003449515</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security technologies for law enforcement agencies
ent://SD_ILS/0/SD_ILS:589138
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Duraklar, Kazım author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI and digital forensics
ent://SD_ILS/0/SD_ILS:557101
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number QA76.9 .A25 D345 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003469438">https://www.taylorfrancis.com/books/9781003469438</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
MASTERING CYBERSECURITY a practical guide for professionals. Volume 1.
ent://SD_ILS/0/SD_ILS:579460
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Bhardwaj, Akashdeep.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003542520">https://www.taylorfrancis.com/books/9781003542520</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The art of cyber defense : from risk assessment to threat intelligence
ent://SD_ILS/0/SD_ILS:586305
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Baddi, Youssef, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714806">https://www.taylorfrancis.com/books/9781032714806</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ransomware : penetration testing and contingency planning
ent://SD_ILS/0/SD_ILS:584139
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003431633">https://www.taylorfrancis.com/books/9781003431633</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OFFENSIVE AND DEFENSIVE CYBER SECURITY STRATEGIES fundamentals, theory and practices.
ent://SD_ILS/0/SD_ILS:590041
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Ouaissa, Mariya. Ouaissa, Mariyam.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003509080">https://www.taylorfrancis.com/books/9781003509080</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ZERO TRUST FRAMEWORK AND PRIVILEGED ACCESS MANAGEMENT (PAM)
ent://SD_ILS/0/SD_ILS:555252
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Das, Ravindra.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470021">https://www.taylorfrancis.com/books/9781003470021</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology security and risk management : inductive cases for information security
ent://SD_ILS/0/SD_ILS:562664
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Wingreen, Stephen C., editor. Samandari, Amelia, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Psybersecurity : human factors of cyber defence
ent://SD_ILS/0/SD_ILS:570825
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Guidetti, Oliver, author, editor. Āhameda, Mahiuddina, author, editor. Speelman, Craig P., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032664859">https://www.taylorfrancis.com/books/9781032664859</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ATTACK-AND-DEFENSE GAMES FOR CONTROL SYSTEMS analysis and synthesis.
ent://SD_ILS/0/SD_ILS:576456
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Yuan, Huanhuan.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003483250">https://www.taylorfrancis.com/books/9781003483250</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime and cybersecurity
ent://SD_ILS/0/SD_ILS:585095
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Watters, Paul A., author.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003406730">https://www.taylorfrancis.com/books/9781003406730</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of security and privacy of AI-enabled healthcare systems and internet of medical things
ent://SD_ILS/0/SD_ILS:585039
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Imoize, Agbotiname Lucky, editor. Balas, Valentina Emilia, editor. Solanki, Vijender Kumar, 1980- editor. Lee, Cheng-Chi, editor. Obaidat, Mohammad S. (Mohammad Salameh), 1952- editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003370321">https://www.taylorfrancis.com/books/9781003370321</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:586024
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBER SECURITY FOR NEXT-GENERATION COMPUTING TECHNOLOGIES
ent://SD_ILS/0/SD_ILS:586025
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Khan, Inam Ullah. Ouaissa, Mariya. Ouaissa, Mariyam. Abou El Houda, Zakaria. Ijaz, Muhammad Fazal.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404361">https://www.taylorfrancis.com/books/9781003404361</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and smart cyber-physical systems
ent://SD_ILS/0/SD_ILS:554165
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Ghosh, Uttam, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003376712">https://www.taylorfrancis.com/books/9781003376712</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ADVANCED TECHNIQUES AND APPLICATIONS OF CYBERSECURITY AND FORENSICS
ent://SD_ILS/0/SD_ILS:558996
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Kaushik, Keshav, editor. Ouaissa, Mariya, editor. Chaudhary, Aryan, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003386926">https://www.taylorfrancis.com/books/9781003386926</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The fusion of artificial intelligence and soft computing techniques for cybersecurity
ent://SD_ILS/0/SD_ILS:587080
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Jabbar, M. A. (PhD), editor. Tiwari, Sanju, 1979- editor. Pani, Subhendu Kumar, 1980- editor. Huang, Stephen (Lecturer in computer science), editor.<br/>Preferred Shelf Number XX(587080.1)<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003428503">https://www.taylorfrancis.com/books/9781003428503</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The business of cyber : why you should question what your security team are telling you
ent://SD_ILS/0/SD_ILS:592690
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Fagan, Peter (Writer on computer security), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003380962">https://www.taylorfrancis.com/books/9781003380962</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The zero trust framework : threat hunting & quantum mechanics
ent://SD_ILS/0/SD_ILS:592723
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003392965">https://www.taylorfrancis.com/books/9781003392965</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SHORTEST HOUR an applied approach to boardroom governance of cybersecurity.
ent://SD_ILS/0/SD_ILS:586100
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Parrish, Lee.<br/>Preferred Shelf Number HD2745<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003477341">https://www.taylorfrancis.com/books/9781003477341</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Resilience in Critical Infrastructure.
ent://SD_ILS/0/SD_ILS:550351
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Küfeoğlu, Sinan. Akgün, Abdullah Talip.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003449522">https://www.taylorfrancis.com/books/9781003449522</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Responsible graph neural networks
ent://SD_ILS/0/SD_ILS:571448
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Abdel-Basset, Mohamed, 1985- author. Moustafa, Nour, author. Hawash, Hossam, author. Tari, Zahir, 1961- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003329701">https://www.taylorfrancis.com/books/9781003329701</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Losing the cybersecurity war : and what we can do to stop it
ent://SD_ILS/0/SD_ILS:590788
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author King, Steve (Cybersecurity expert), author. Chaudry, Kiren, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003331773">https://www.taylorfrancis.com/books/9781003331773</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What to do when you get hacked : a practitioner's guide to incident response in the 21st century
ent://SD_ILS/0/SD_ILS:563599
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Brathwaite, Shimon, author.<br/>Preferred Shelf Number HV8079 .C65 B73 2023<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264293">https://www.taylorfrancis.com/books/9781003264293</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Security Hippie.
ent://SD_ILS/0/SD_ILS:587563
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Engel, Barak.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity : a practical engineering approach
ent://SD_ILS/0/SD_ILS:558400
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Santos, Henrique, 1960- author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/e/9780429286742">https://www.taylorfrancis.com/books/e/9780429286742</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced cybersecurity technologies
ent://SD_ILS/0/SD_ILS:559536
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Moseley, Ralph, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003096894">https://www.taylorfrancis.com/books/9781003096894</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zero trust journey across the digital estate
ent://SD_ILS/0/SD_ILS:560700
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Pillai, Binil, author. Kudrati, Abbas, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225096">https://www.taylorfrancis.com/books/9781003225096</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evidence-based cybersecurity : foundations, research, and practice
ent://SD_ILS/0/SD_ILS:580097
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Pomerleau, Pierre-Luc, author. Maimon, David, 1978- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003201519">https://www.taylorfrancis.com/books/9781003201519</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for information security and privacy
ent://SD_ILS/0/SD_ILS:580861
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Rao, Udai Pratap, editor.<br/>Preferred Shelf Number QA76.9 .B56 B555 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003129486">https://www.taylorfrancis.com/books/9781003129486</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense mechanisms security, privacy, and challenges
ent://SD_ILS/0/SD_ILS:571884
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Kumar, Gautam, 1990- Saini, Dinesh Kumar, 1974- Cuong, Nguyen Ha Huy.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367816438">https://www.taylorfrancis.com/books/9780367816438</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secret history the story of cryptology
ent://SD_ILS/0/SD_ILS:567958
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Bauer, Craig P., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315162539">https://www.taylorfrancis.com/books/9781315162539</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent trends in blockchain for information systems security and privacy
ent://SD_ILS/0/SD_ILS:576110
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Tyagi, Amit Kumar, 1988- editor. Abraham, Ajith, 1968- editor.<br/>Preferred Shelf Number QA76.9 .B56<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003139737">https://www.taylorfrancis.com/books/9781003139737</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and optimization
ent://SD_ILS/0/SD_ILS:556640
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Tanwar, Rohit, editor. Choudhury, Tanupriya, editor. Zamani, Mazdak, editor. Gupta, Sunil, 1979- editor.<br/>Preferred Shelf Number QA76.9 .A25 I63 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure searchable encryption and data management
ent://SD_ILS/0/SD_ILS:564284
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Gupta, Brij, 1982- author. Mamta, author.<br/>Preferred Shelf Number QA76.9 .A25 G87 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003107316">https://www.taylorfrancis.com/books/9781003107316</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY ISSUES IN EMERGING TECHNOLOGIES
ent://SD_ILS/0/SD_ILS:564291
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Maglaras, Leandros, editor. Kantzavelou, Ioanna, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003109952">https://www.taylorfrancis.com/books/9781003109952</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced smart computing technologies in cybersecurity and forensics
ent://SD_ILS/0/SD_ILS:579984
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Kaushik, Keshav, editor. Tayal, Shubham, editor. Bhardwaj, Akashdeep, 1971- editor. Kumar, Manoj (Professor of computer science), editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003140023">https://www.taylorfrancis.com/books/9781003140023</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Behavioral cybersecurity : fundamental principles and applications of personality psychology
ent://SD_ILS/0/SD_ILS:573974
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Patterson, Wayne, 1945- author. Winston-Proctor, Cynthia E., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003052029">https://www.taylorfrancis.com/books/9781003052029</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:543620
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number QA76.9 .A25 M85 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secret history : the story of cryptology
ent://SD_ILS/0/SD_ILS:365258
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Bauer, Craig P.<br/>Preferred Shelf Number QA76.9.A25 B384 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-
ent://SD_ILS/0/SD_ILS:146922
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Heiderich, Mario.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Testing code security
ent://SD_ILS/0/SD_ILS:546167
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Van der Linden, Maura A., author.<br/>Preferred Shelf Number QA76.9 .A25 V359 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Data-driven block ciphers for fast telecommunication systems
ent://SD_ILS/0/SD_ILS:546948
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Moldovyan, Nick., author. Moldovyan, Alex.<br/>Preferred Shelf Number QA76.9 .A25 M664 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Codes : the guide to secrecy from ancient to modern times
ent://SD_ILS/0/SD_ILS:546062
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number QA76.9 .A25 M67 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Investigator's guide to steganography
ent://SD_ILS/0/SD_ILS:541281
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Kipper, Gregory., author.<br/>Preferred Shelf Number QA76.9 .A25 K544 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secure computers and networks : analysis, design, and implementation
ent://SD_ILS/0/SD_ILS:540568
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Fisch, Eric A. White, Gregory B.<br/>Preferred Shelf Number QA76.9 .A25 F5334 2000<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2026-01-08T01:28:59Z
2026-01-08T01:28:59Z
Author Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>