Search Results for Features. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dFeatures.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list 2026-03-20T16:48:42Z Fault-Tolerant Distributed Consensus in Synchronous Networks ent://SD_ILS/0/SD_ILS:607763 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Choudhury, Ashish. author.&#160;Patra, Arpita. author. (orcid)0000-0002-8036-4407&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80460-1">https://doi.org/10.1007/978-3-031-80460-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners ent://SD_ILS/0/SD_ILS:608948 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Guo, Fuchun. author. (orcid)0000-0001-6939-7710&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Nguyen, Khoa. author.&#160;Chen, Xiaofeng. author.&#160;Zhao, Zhen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Computing and Quantum Machine Learning for Engineers and Developers ent://SD_ILS/0/SD_ILS:610159 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Van Griensven Th&eacute;, Jesse. author.&#160;Fraser, Roydon Andrew. author.&#160;Rosas-Bustos, Jose. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-98245-3">https://doi.org/10.1007/978-3-031-98245-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cybersecurity A Multidisciplinary Challenge ent://SD_ILS/0/SD_ILS:601841 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Sharp, Robin. author. (orcid)0000-0002-8593-267X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Execution Environments ent://SD_ILS/0/SD_ILS:604058 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Shepherd, Carlton. author.&#160;Markantonakis, Konstantinos. author. (orcid)0000-0003-3975-9033&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55561-9">https://doi.org/10.1007/978-3-031-55561-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2023 ent://SD_ILS/0/SD_ILS:603303 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Chaturvedi, Atul. editor.&#160;Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221&#160;Roy, Bimal Kumar. editor.&#160;Tsaban, Boaz. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0641-9">https://doi.org/10.1007/978-981-97-0641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022 ent://SD_ILS/0/SD_ILS:601864 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Roy, Bimal Kumar. editor.&#160;Chaturvedi, Atul. editor.&#160;Tsaban, Boaz. editor.&#160;Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2229-1">https://doi.org/10.1007/978-981-99-2229-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms ent://SD_ILS/0/SD_ILS:603566 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Paar, Christof. author.&#160;Pelzl, Jan. author.&#160;G&uuml;neysu, Tim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-69007-9">https://doi.org/10.1007/978-3-662-69007-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 2 : Cryptanalysis and future directions ent://SD_ILS/0/SD_ILS:598806 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum blockchain : an emerging cryptographic paradigm ent://SD_ILS/0/SD_ILS:597796 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Dhanaraj, Rajesh Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Animal Biometrics Techniques and Applications ent://SD_ILS/0/SD_ILS:612758 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Kumar, Santosh. author.&#160;Singh, Sanjay Kumar. author.&#160;Singh, Rishav. author.&#160;Singh, Amit Kumar. author. (orcid)0000-0001-7359-2068&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7956-6">https://doi.org/10.1007/978-981-10-7956-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:618045 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Borges de Oliveira, F&aacute;bio. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40718-0">https://doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:611657 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:616293 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Phan, Rapha&euml;l C.-W. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:613138 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor.&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:611890 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:614814 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Rowe, Neil C. author.&#160;Rrushi, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethics in Computing A Concise Module ent://SD_ILS/0/SD_ILS:617386 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Hadoop Security ent://SD_ILS/0/SD_ILS:618551 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Lakhe, Bhushan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6545-0">https://doi.org/10.1007/978-1-4302-6545-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting Oracle Database 12c ent://SD_ILS/0/SD_ILS:618628 2026-03-20T16:48:42Z 2026-03-20T16:48:42Z Author&#160;Wright, Paul. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6212-1">https://doi.org/10.1007/978-1-4302-6212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>