Search Results for Security Measures. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300? 2026-03-04T01:25:07Z Safeguarding satellite communications : issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:600245 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;An, Jianpin, author.<br/>Preferred Shelf Number&#160;TK5104 .A53 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:560055 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Ba&#351;, Esra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514190">https://www.taylorfrancis.com/books/9781003514190</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:557931 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number&#160;TK5102.94 .A44 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs ent://SD_ILS/0/SD_ILS:577899 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Chowdhury, Rajdeep, editor.&#160;Niranjan, S. K., editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building secure cars : assuring the automotive software development lifecycle ent://SD_ILS/0/SD_ILS:596310 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Oka, Dennis Kengo, author.<br/>Preferred Shelf Number&#160;TL272.53 .O42 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and its challenges in the 21st Century ent://SD_ILS/0/SD_ILS:597077 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Guerrier, Claudine, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic security solutions for the internet of things ent://SD_ILS/0/SD_ILS:481771 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Banday, Mohammad Tariq, 1969- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Cao, Zhenfu.<br/>Preferred Shelf Number&#160;ONLINE(344263.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Chaos synchronization and cryptography for secure communications applications for encryption ent://SD_ILS/0/SD_ILS:277940 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Banerjee, Santo, 1976-&#160;IGI Global.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security and cryptography : specifications and implementations ent://SD_ILS/0/SD_ILS:543513 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Sklavos, Nicolas.&#160;Zhang, Xinmiao.<br/>Preferred Shelf Number&#160;TK5103.2 .W57415 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:543504 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;TK5102.94 .Q36 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Preferred Shelf Number&#160;QA76.9 .A25 B79 2005<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:253900 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Contemporary cryptology the science of information integrity ent://SD_ILS/0/SD_ILS:249661 2026-03-04T01:25:07Z 2026-03-04T01:25:07Z Author&#160;Simmons, Gustavus J.&#160;Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>