Search Results for Cryptography. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300? 2024-11-06T00:24:43Z Cryptography for developers ent://SD_ILS/0/SD_ILS:147686 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;St. Denis, Tom.&#160;Johnson, Simon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">http://www.sciencedirect.com/science/book/9781597491044</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:106301 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA268 B83 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:93536 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA 268 .B83 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Preferred Shelf Number&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:290332 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420026603">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:144203 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Hook, David, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:364648 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Kraft, James S., author.&#160;Washington, Lawrence C., author.<br/>Preferred Shelf Number&#160;QA241 K73 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Cao, Zhenfu.<br/>Preferred Shelf Number&#160;ONLINE(344263.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Cryptography and Secret-Key Distillation ent://SD_ILS/0/SD_ILS:235140 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Assche, Gilles van .<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Everyday Cryptography Fundamental Principles and Applications ent://SD_ILS/0/SD_ILS:279211 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Martin, Keith M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elliptic curves number theory and cryptography ent://SD_ILS/0/SD_ILS:288710 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Washington, Lawrence C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420071474">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information theory, coding and cryptography ent://SD_ILS/0/SD_ILS:386137 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Bose, Ranjan.<br/>Preferred Shelf Number&#160;QA268 B743 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:253900 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security and cryptography specifications and implementations ent://SD_ILS/0/SD_ILS:287504 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Sklavos, Nicolas.&#160;Zhang, Xinmiao.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849387692">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Java cryptography extensions practical guide for programmers ent://SD_ILS/0/SD_ILS:253797 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Weiss, Jason (Jason R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127427515">http://www.sciencedirect.com/science/book/9780127427515</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:286252 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Patil, Harsh Kupwade.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chaos synchronization and cryptography for secure communications applications for encryption ent://SD_ILS/0/SD_ILS:277940 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Banerjee, Santo, 1976-&#160;IGI Global.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Algorithmic cryptanalysis ent://SD_ILS/0/SD_ILS:286903 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Joux, Antoine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420070033">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kriptografi ile say&#305;lar teorisine giri&#351; ent://SD_ILS/0/SD_ILS:514074 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Kraft, James R.&#160;Terziler, Mehmet.<br/>Preferred Shelf Number&#160;QA241 K7319 2022<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptographic security solutions for the internet of things ent://SD_ILS/0/SD_ILS:481771 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Banday, Mohammad Tariq, 1969- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:458788 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Shavers, Brett, author.&#160;Bair, John, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128033401">https://www.sciencedirect.com/science/book/9780128033401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:356403 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;ONLINE(356403.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439895849">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:146922 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Heiderich, Mario.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:298025 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:147530 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Cusick, Thomas W., 1943-&#160;St&#259;nic&#259;, Pantelimon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied cryptanalysis breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:249508 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Stamp, Mark.&#160;Low, Richard M., 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data-driven block ciphers for fast telecommunication systems ent://SD_ILS/0/SD_ILS:287763 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Moldovyan, Nick.&#160;Moldovyan, Alex.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420054125">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Authentication codes and combinatorial designs ent://SD_ILS/0/SD_ILS:284659 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Pei, Dingyi.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003185">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:286402 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Einf&uuml;hrung in die Kryptographie ent://SD_ILS/0/SD_ILS:387328 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA268 B84 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Codes and Ciphers Julius Caesar, the Enigma, and the Internet ent://SD_ILS/0/SD_ILS:238199 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Churchhouse, R. F..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511542978">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Contemporary cryptology the science of information integrity ent://SD_ILS/0/SD_ILS:249661 2024-11-06T00:24:43Z 2024-11-06T00:24:43Z Author&#160;Simmons, Gustavus J.&#160;Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>