Search Results for Cryptography. - Narrowed by: Networking.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dSUBJECT$002509Subject$002509Networking.$002509Networking.$0026te$003dILS$0026ps$003d300?
2026-02-22T17:53:09Z
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network coding for engineers
ent://SD_ILS/0/SD_ILS:599745
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Médard, Muriel, author. Vasudevan, Vipindev Adat, author. Pedersen, Morten Videbaek, author. Duffy, Ken R., author.<br/>Preferred Shelf Number TK5102.92 .M43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394217304">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394217304</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lessons from the Frontlines : Insights from a Cybersecurity Career.
ent://SD_ILS/0/SD_ILS:600433
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Keren.<br/>Preferred Shelf Number XX(600433.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain
ent://SD_ILS/0/SD_ILS:599650
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Li, Hu, author. Wang, Han, author.<br/>Preferred Shelf Number QA76.9 .B56 L5 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and privacy vision in 6G : a comprehensive guide
ent://SD_ILS/0/SD_ILS:598347
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Porambage, Pawani, author. Liyanage, Madhusanka, author.<br/>Preferred Shelf Number TK5103.252 .P67 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119875437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and its challenges in the 21st Century
ent://SD_ILS/0/SD_ILS:597077
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Guerrier, Claudine, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-02-22T17:53:09Z
2026-02-22T17:53:09Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>