Search Results for Integrity. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dIntegrity.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026te$003dILS$0026ps$003d300?dt=list 2026-04-05T14:54:52Z Contemporary cryptology the science of information integrity ent://SD_ILS/0/SD_ILS:249661 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Simmons, Gustavus J.&#160;Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Embedded Systems Security ent://SD_ILS/0/SD_ILS:604651 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Hou, Xiaolu. author.&#160;Breier, Jakub. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62205-2">https://doi.org/10.1007/978-3-031-62205-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Archives in the digital age : preservation and the right to be forgotten ent://SD_ILS/0/SD_ILS:596719 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Mkadmi, Abderrazak, author.<br/>Preferred Shelf Number&#160;CD973 .D53<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611842 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Wen, Sheng. editor.&#160;Wu, Wei. editor.&#160;Castiglione, Aniello. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-69471-9">https://doi.org/10.1007/978-3-319-69471-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:616283 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Zhu, Liehuang. author.&#160;Zhang, Zijian. author.&#160;Xu, Chang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:611077 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Lu, Rongxing. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616133 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Franz, Michael. editor.&#160;Papadimitratos, Panos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building the Infrastructure for Cloud Security A Solutions View ent://SD_ILS/0/SD_ILS:618624 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Yeluri, Raghuram. author.&#160;Castro-Leon, Enrique. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6146-9">https://doi.org/10.1007/978-1-4302-6146-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security and cryptography : specifications and implementations ent://SD_ILS/0/SD_ILS:543513 2026-04-05T14:54:52Z 2026-04-05T14:54:52Z Author&#160;Sklavos, Nicolas.&#160;Zhang, Xinmiao.<br/>Preferred Shelf Number&#160;TK5103.2 .W57415 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>