Search Results for Data. - Narrowed by: Data encryption (Computer science)SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ps$003d300?2025-12-24T23:47:24ZData hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:4590832025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Hassan, Nihad Ahmad. Hijazi, Rami. Salminen, Helvi.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044490">http://www.sciencedirect.com/science/book/9780128044490</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Next generation SSH2 implementation securing data in motionent://SD_ILS/0/SD_ILS:1462752025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data hiding fundamentals and applications content security in digital mediaent://SD_ILS/0/SD_ILS:2545242025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Sencar, Husrev T. Ramkumar Mahalingam. Akansu, Ali N., 1958-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120471447">http://www.sciencedirect.com/science/book/9780120471447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Blockchain and the law : the rule of codeent://SD_ILS/0/SD_ILS:5097322025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor De Filippi, Primavera, author. Wright, Aaron (Writer on law), author.<br/>Preferred Shelf Number XX(509732.1)<br/>Electronic Access EBSCOhost <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1743737">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1743737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:4587882025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Shavers, Brett, author. Bair, John, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128033401">https://www.sciencedirect.com/science/book/9780128033401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Audio content security : attack analysis on audio watermarkingent://SD_ILS/0/SD_ILS:4589902025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Ghorbani, Sogand, author. Amiri, Iraj Sadegh, 1977- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128113837">http://www.sciencedirect.com/science/book/9780128113837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Java programlama diliyle kriptoloji uygulamalarıent://SD_ILS/0/SD_ILS:3803192025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Bodur, Hüseyin<br/>Preferred Shelf Number QA76.9.A25 B63 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Practical cryptography : algorithms and implementations using C++ent://SD_ILS/0/SD_ILS:5401332025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Azad, Saiful, editor. Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P725 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482228908">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Understanding Bitcoin Cryptography, Engineering and Economics.ent://SD_ILS/0/SD_ILS:3421592025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Franco, Pedro.<br/>Preferred Shelf Number ONLINE(342159.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:3442632025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational number theoryent://SD_ILS/0/SD_ILS:3643092025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Das, Abhijit, 1968-<br/>Preferred Shelf Number QA241 D37 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Secret history : the story of cryptologyent://SD_ILS/0/SD_ILS:3652582025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Bauer, Craig P.<br/>Preferred Shelf Number QA76.9.A25 B384 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Algebraic curves in cryptographyent://SD_ILS/0/SD_ILS:5441622025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Ling, San, 1964, author. Wang, Huaxiong. Xing, Chaoping, 1963-<br/>Preferred Shelf Number QA268 .L545 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420079470">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Computational number theory and modern cryptographyent://SD_ILS/0/SD_ILS:2991262025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Yan, Song Y.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602</a>
Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118188606">http://onlinelibrary.wiley.com/book/10.1002/9781118188606</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118188606">http://dx.doi.org/10.1002/9781118188606</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1120602">http://swb.eblib.com/patron/FullRecord.aspx?p=1120602</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Quantum Cryptography and Secret-Key Distillationent://SD_ILS/0/SD_ILS:2351402025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Assche, Gilles van .<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning in image steganalysisent://SD_ILS/0/SD_ILS:2493782025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Schaathun, Hans Georg.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6331046">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6331046</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Everyday Cryptography Fundamental Principles and Applicationsent://SD_ILS/0/SD_ILS:2792112025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Martin, Keith M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computingent://SD_ILS/0/SD_ILS:2795142025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Weber, Stefan G. IOS Press.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:5387542025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Paul, Goutam., author. Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number QA76.9 .A25 P385 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:5394682025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number TA1637 .V544 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Noiseless steganography : the key to covert communicationsent://SD_ILS/0/SD_ILS:5465972025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Desoky, Abdelrahman., author.<br/>Preferred Shelf Number QA268 .D47 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439846223">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:3038382025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:2980252025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Chaos synchronization and cryptography for secure communications applications for encryptionent://SD_ILS/0/SD_ILS:2779402025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of financial cryptography and securityent://SD_ILS/0/SD_ILS:5420982025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Rosenberg, Burton.<br/>Preferred Shelf Number HG1710 .H34 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:1475302025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Cusick, Thomas W., 1943- Stănică, Pantelimon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multimedia content encryption : techniques and applicationsent://SD_ILS/0/SD_ILS:5399552025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Lian, Shiguo., author.<br/>Preferred Shelf Number QA76.575 .L52 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420065282">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Applied cryptanalysis breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:2495082025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Quantum communications and cryptographyent://SD_ILS/0/SD_ILS:5435042025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Sergienko, Alexander V.<br/>Preferred Shelf Number TK5102.94 .Q36 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>CryptoGraphics : exploiting graphics cards for securityent://SD_ILS/0/SD_ILS:1197412025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Cook, Debra L. Keromytis, Angelos.<br/>Preferred Shelf Number QA76.9.D314 C66 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Multimedia encryption and authentication techniques and applicationsent://SD_ILS/0/SD_ILS:5431952025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Furht, Borivoje. Kirovski, Darko.<br/>Preferred Shelf Number QA76.575 .M83185 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013450">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Authentication codes and combinatorial designsent://SD_ILS/0/SD_ILS:5470492025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Pei, Dingyi., author.<br/>Preferred Shelf Number QA76.9 .A25 P42 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Elektronik imza ve uygulamasıent://SD_ILS/0/SD_ILS:1319682025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Orta, Mesut.<br/>Preferred Shelf Number KKX872.5 .O78 2005<br/>Format: Books<br/>Availability Law Library~1<br/>Codes : the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:5460622025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number QA76.9 .A25 M67 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Watermarking systems engineering : enabling digital assets security and other applicationsent://SD_ILS/0/SD_ILS:5443562025-12-24T23:47:24Z2025-12-24T23:47:24ZAuthor Barni, Mauro., author. Bartolini, Franco, 1965-2004.<br/>Preferred Shelf Number QA76.9 .A25 B3792 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135538460">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>