Search Results for Data encryption (Computer science) - Narrowed by: Wiley E-Book Collection
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AWILEY$002509Wiley$002bE-Book$002bCollection$0026ps$003d300?
2026-02-11T12:00:17Z
Embedded cryptography. 1
ent://SD_ILS/0/SD_ILS:599697
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Prouff, Emmanuel, editor. Renault, Guenael. Rivain, Mattieu. O'Flynn, Colin.<br/>Preferred Shelf Number QA76.9 .A25 E43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded cryptography 2
ent://SD_ILS/0/SD_ILS:599724
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied satisfiability : cryptography, scheduling and coalitional games
ent://SD_ILS/0/SD_ILS:599624
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Liao, Xiaojuan, author. Koshimura, Miyuki, author.<br/>Preferred Shelf Number QA76.9 .A3 L53 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded Cryptography. 3
ent://SD_ILS/0/SD_ILS:599815
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fog computing for intelligent cloud IoT systems
ent://SD_ILS/0/SD_ILS:599191
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Banerjee, Chandan, editor. Ghosh, Anupam, editor. Chakraborty, Rajdeep, editor. Elngar, Ahmed A., editor.<br/>Preferred Shelf Number TK5105.8857 .F64 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolving networking technologies : developments and future directions
ent://SD_ILS/0/SD_ILS:598339
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Gupta, Shaurya, editor.<br/>Preferred Shelf Number TK5105.5 .E96 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts
ent://SD_ILS/0/SD_ILS:597703
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Poston, Howard E., III, author.<br/>Preferred Shelf Number QA76.9 .B56 P67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Asymmetric cryptography : primitives and protocols
ent://SD_ILS/0/SD_ILS:598096
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Pointcheval, David, editor.<br/>Preferred Shelf Number QA76.9 .A25 A83 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto
ent://SD_ILS/0/SD_ILS:595556
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-11T12:00:17Z
2026-02-11T12:00:17Z
Author Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>