Search Results for Files. - Narrowed by: Data encryption (Computer science)
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dFiles.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ps$003d300?
2026-02-23T06:04:45Z
Applied satisfiability : cryptography, scheduling and coalitional games
ent://SD_ILS/0/SD_ILS:599624
2026-02-23T06:04:45Z
2026-02-23T06:04:45Z
Author Liao, Xiaojuan, author. Koshimura, Miyuki, author.<br/>Preferred Shelf Number QA76.9 .A3 L53 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-23T06:04:45Z
2026-02-23T06:04:45Z
Author Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visual cryptography and secret image sharing
ent://SD_ILS/0/SD_ILS:539468
2026-02-23T06:04:45Z
2026-02-23T06:04:45Z
Author Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number TA1637 .V544 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Noiseless steganography : the key to covert communications
ent://SD_ILS/0/SD_ILS:546597
2026-02-23T06:04:45Z
2026-02-23T06:04:45Z
Author Desoky, Abdelrahman., author.<br/>Preferred Shelf Number QA268 .D47 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439846223">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>