Search Results for Data encryption (Computer science) - Narrowed by: Electronic books.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300?
2026-02-17T06:09:40Z
Embedded cryptography 2
ent://SD_ILS/0/SD_ILS:599724
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fog computing for intelligent cloud IoT systems
ent://SD_ILS/0/SD_ILS:599191
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Banerjee, Chandan, editor. Ghosh, Anupam, editor. Chakraborty, Rajdeep, editor. Elngar, Ahmed A., editor.<br/>Preferred Shelf Number TK5105.8857 .F64 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolving networking technologies : developments and future directions
ent://SD_ILS/0/SD_ILS:598339
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Gupta, Shaurya, editor.<br/>Preferred Shelf Number TK5105.5 .E96 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts
ent://SD_ILS/0/SD_ILS:597703
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Poston, Howard E., III, author.<br/>Preferred Shelf Number QA76.9 .B56 P67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Bitcoin Cryptography, Engineering and Economics.
ent://SD_ILS/0/SD_ILS:342159
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Franco, Pedro.<br/>Preferred Shelf Number ONLINE(342159.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine learning in image steganalysis
ent://SD_ILS/0/SD_ILS:249378
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Schaathun, Hans Georg.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6331046">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6331046</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:303838
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2026-02-17T06:09:40Z
2026-02-17T06:09:40Z
Author Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>