Search Results for Data Encryption. - Narrowed by: Beytepe General Collection SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ABEYTEPEGEN$002509Beytepe$002bGeneral$002bCollection$0026ic$003dtrue$0026ps$003d300?dt=list 2025-01-01T14:34:11Z Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:380319 2025-01-01T14:34:11Z 2025-01-01T14:34:11Z Author&#160;Bodur, H&uuml;seyin<br/>Preferred Shelf Number&#160;QA76.9.A25 B63 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2025-01-01T14:34:11Z 2025-01-01T14:34:11Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computational number theory ent://SD_ILS/0/SD_ILS:364309 2025-01-01T14:34:11Z 2025-01-01T14:34:11Z Author&#160;Das, Abhijit, 1968-<br/>Preferred Shelf Number&#160;QA241 D37 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2025-01-01T14:34:11Z 2025-01-01T14:34:11Z Author&#160;Bauer, Craig P.<br/>Preferred Shelf Number&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> CryptoGraphics : exploiting graphics cards for security ent://SD_ILS/0/SD_ILS:119741 2025-01-01T14:34:11Z 2025-01-01T14:34:11Z Author&#160;Cook, Debra L.&#160;Keromytis, Angelos.<br/>Preferred Shelf Number&#160;QA76.9.D314 C66 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>