Search Results for Experience.. - Narrowed by: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dExperience..$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300$0026isd$003dtrue?dt=list2026-04-07T23:21:30ZInformation Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:6111532026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Liu, Joseph K. editor. Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:6135072026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Bao, Feng. editor. Chen, Liqun. editor. (orcid)0000-0003-2680-4907 Deng, Robert H. editor. Wang, Guojun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles and applications of blockchain systems : how to overcome the CAP trilemma in consortium blockchainent://SD_ILS/0/SD_ILS:5996502026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Li, Hu, author. Wang, Han, author.<br/>Preferred Shelf Number QA76.9 .B56 L5 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394237258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginnersent://SD_ILS/0/SD_ILS:6089482026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Guo, Fuchun. author. (orcid)0000-0001-6939-7710 Susilo, Willy. author. (orcid)0000-0002-1562-5105 Nguyen, Khoa. author. Chen, Xiaofeng. author. Zhao, Zhen. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithmsent://SD_ILS/0/SD_ILS:6035662026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Paar, Christof. author. Pelzl, Jan. author. Güneysu, Tim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-69007-9">https://doi.org/10.1007/978-3-662-69007-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireshark for security professionals : using Wireshark and the Metasploit Frameworkent://SD_ILS/0/SD_ILS:5934722026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Guide to Digital Forensics A Concise and Practical Introductionent://SD_ILS/0/SD_ILS:6178552026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Kävrestad, Joakim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-67450-6">https://doi.org/10.1007/978-3-319-67450-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Elements of Cloud Storage Security Concepts, Designs and Optimized Practicesent://SD_ILS/0/SD_ILS:6114482026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Galibus, Tatiana. author. Krasnoproshin, Viktor V. author. (orcid)0000-0002-9463-4869 de Oliveira Albuquerque, Robson. author. Pignaton de Freitas, Edison. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ten Laws for Securityent://SD_ILS/0/SD_ILS:6178052026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Diehl, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:6185842026-04-07T23:21:30Z2026-04-07T23:21:30ZAuthor Ruan, Xiaoyu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>