Search Results for Maps. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMaps.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list 2026-03-22T14:56:18Z The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-22T14:56:18Z 2026-03-22T14:56:18Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618104 2026-03-22T14:56:18Z 2026-03-22T14:56:18Z Author&#160;Fischlin, Marc. editor.&#160;Coron, Jean-S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:613859 2026-03-22T14:56:18Z 2026-03-22T14:56:18Z Author&#160;Hirt, Martin. editor.&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616768 2026-03-22T14:56:18Z 2026-03-22T14:56:18Z Author&#160;Fischlin, Marc. editor.&#160;Coron, Jean-S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:615946 2026-03-22T14:56:18Z 2026-03-22T14:56:18Z Author&#160;Hirt, Martin. editor.&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>