Search Results for Public key infrastructure (Computer security) - Narrowed by: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPublic$002bkey$002binfrastructure$002b$002528Computer$002bsecurity$002529$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?
2026-01-25T23:44:30Z
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-25T23:44:30Z
2026-01-25T23:44:30Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Beginning cryptography with Java
ent://SD_ILS/0/SD_ILS:144203
2026-01-25T23:44:30Z
2026-01-25T23:44:30Z
Author Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>