Search Results for Data. - Narrowed by: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?
2026-02-23T05:42:24Z
Next generation mechanism for data encryption
ent://SD_ILS/0/SD_ILS:552326
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Kumar, Keshav (Engineer), editor. Pandey, Bishwajeet, editor.<br/>Preferred Shelf Number QA76.9 .D335<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003508632">https://www.taylorfrancis.com/books/9781003508632</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigms
ent://SD_ILS/0/SD_ILS:600050
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number T59.6 .N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data-driven block ciphers for fast telecommunication systems
ent://SD_ILS/0/SD_ILS:546948
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Moldovyan, Nick., author. Moldovyan, Alex.<br/>Preferred Shelf Number QA76.9 .A25 M664 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Embedded cryptography. 1
ent://SD_ILS/0/SD_ILS:599697
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Prouff, Emmanuel, editor. Renault, Guenael. Rivain, Mattieu. O'Flynn, Colin.<br/>Preferred Shelf Number QA76.9 .A25 E43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 2 : Cryptanalysis and future directions
ent://SD_ILS/0/SD_ILS:598806
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Asymmetric cryptography : primitives and protocols
ent://SD_ILS/0/SD_ILS:598096
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Pointcheval, David, editor.<br/>Preferred Shelf Number QA76.9 .A25 A83 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agility
ent://SD_ILS/0/SD_ILS:600179
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Arun, Jai Singh, author. Harishankar, Ray, author. Rjaibi, Walid, author. Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number QA76.889<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Manuscrypt : designed for mankind - anthropocentric information security
ent://SD_ILS/0/SD_ILS:579444
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Upadhyaya, Prashant A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527220">https://www.taylorfrancis.com/books/9781003527220</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptosystems
ent://SD_ILS/0/SD_ILS:560055
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Baş, Esra, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514190">https://www.taylorfrancis.com/books/9781003514190</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchain
ent://SD_ILS/0/SD_ILS:599650
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Li, Hu, author. Wang, Han, author.<br/>Preferred Shelf Number QA76.9 .B56 L5 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded cryptography 2
ent://SD_ILS/0/SD_ILS:599724
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Crypto and AI From Coevolution to Quantum Revolution
ent://SD_ILS/0/SD_ILS:528761
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Zolfaghari, Behrouz. author. Nemati, Hamid. author. Yanai, Naoto. author. Bibak, Khodakhast. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44807-2">https://doi.org/10.1007/978-3-031-44807-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Nature-Inspired Approach to Cryptology
ent://SD_ILS/0/SD_ILS:528952
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Shandilya, Shishir Kumar. author. Datta, Agni. author. Nagar, Atulya K. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-7081-0">https://doi.org/10.1007/978-981-99-7081-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:557931
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number TK5102.94 .A44 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum blockchain : an emerging cryptographic paradigm
ent://SD_ILS/0/SD_ILS:597796
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Dhanaraj, Rajesh Kumar, editor.<br/>Preferred Shelf Number QA76.9 .B56<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Archives in the digital age : preservation and the right to be forgotten
ent://SD_ILS/0/SD_ILS:596719
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Mkadmi, Abderrazak, author.<br/>Preferred Shelf Number CD973 .D53<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and its challenges in the 21st Century
ent://SD_ILS/0/SD_ILS:597077
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Guerrier, Claudine, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto
ent://SD_ILS/0/SD_ILS:595556
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for distributed systems security
ent://SD_ILS/0/SD_ILS:595146
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Applied Cryptography
ent://SD_ILS/0/SD_ILS:546435
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Menezes, Alfred J., author. Katz, Jonathan, author. van Oorschot, Paul C., author. Vanstone, Scott A., author. Taylor and Francis.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
ent://SD_ILS/0/SD_ILS:458788
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Shavers, Brett, author. Bair, John, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128033401">https://www.sciencedirect.com/science/book/9780128033401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Audio Watermarking Based on Singular Value Decomposition
ent://SD_ILS/0/SD_ILS:530260
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Dhar, Pranab Kumar. author. Shimamura, Tetsuya. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14800-7">https://doi.org/10.1007/978-3-319-14800-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soliton Coding for Secured Optical Communication Link
ent://SD_ILS/0/SD_ILS:530297
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Sadegh Amiri, Iraj. author. Alavi, Sayed Ehsan. author. Mahdaliza Idrus, Sevia. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-287-161-9">https://doi.org/10.1007/978-981-287-161-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
New directions of modern cryptography
ent://SD_ILS/0/SD_ILS:344263
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Everyday Cryptography Fundamental Principles and Applications
ent://SD_ILS/0/SD_ILS:279211
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Martin, Keith M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Cryptography and Secret-Key Distillation
ent://SD_ILS/0/SD_ILS:235140
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Assche, Gilles van .<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos synchronization and cryptography for secure communications applications for encryption
ent://SD_ILS/0/SD_ILS:277940
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Boolean functions and applications
ent://SD_ILS/0/SD_ILS:147530
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Cusick, Thomas W., 1943- Stănică, Pantelimon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless security and cryptography : specifications and implementations
ent://SD_ILS/0/SD_ILS:543513
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Sklavos, Nicolas. Zhang, Xinmiao.<br/>Preferred Shelf Number TK5103.2 .W57415 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Authentication codes and combinatorial designs
ent://SD_ILS/0/SD_ILS:547049
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Pei, Dingyi., author.<br/>Preferred Shelf Number QA76.9 .A25 P42 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Quantum communications and cryptography
ent://SD_ILS/0/SD_ILS:543504
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Sergienko, Alexander V.<br/>Preferred Shelf Number TK5102.94 .Q36 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction : a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:593044
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Preferred Shelf Number QA76.9 .A25 B79 2005<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Investigator's guide to steganography
ent://SD_ILS/0/SD_ILS:541281
2026-02-23T05:42:24Z
2026-02-23T05:42:24Z
Author Kipper, Gregory., author.<br/>Preferred Shelf Number QA76.9 .A25 K544 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>