Search Results for Programming Language. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dProgramming$002bLanguage.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-14T09:51:00Z Attacks and Defenses for the Internet-of-Things 7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607638 2026-03-14T09:51:00Z 2026-03-14T09:51:00Z Author&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;Shao, Jun. editor. (orcid)0000-0001-8352-0973&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85593-1">https://doi.org/10.1007/978-3-031-85593-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-03-14T09:51:00Z 2026-03-14T09:51:00Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Manager's Guide to Web Application Security A Concise Guide to the Weaker Side of the Web ent://SD_ILS/0/SD_ILS:618640 2026-03-14T09:51:00Z 2026-03-14T09:51:00Z Author&#160;Lepofsky, Ron. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4842-0148-0">https://doi.org/10.1007/978-1-4842-0148-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>