Search Results for Information Technology. - Narrowed by: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?2026-01-21T14:01:04ZCyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography : algorithms, protocols, and standards for computer securityent://SD_ILS/0/SD_ILS:5989142026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTsent://SD_ILS/0/SD_ILS:5778992026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Chowdhury, Rajdeep, editor. Niranjan, S. K., editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Modern cryptography with proof techniques and implementations.ent://SD_ILS/0/SD_ILS:5770002026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Hwang, Seong Oun, author. Kim, Intae, author. Lee, Wai Kong, author.<br/>Preferred Shelf Number TK5102.94 .M63 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003152569">https://www.taylorfrancis.com/books/9781003152569</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and its challenges in the 21st Centuryent://SD_ILS/0/SD_ILS:5970772026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Guerrier, Claudine, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadershipent://SD_ILS/0/SD_ILS:5958872026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Blockchain for distributed systems securityent://SD_ILS/0/SD_ILS:5951462026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-01-21T14:01:04Z2026-01-21T14:01:04ZAuthor Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>