Search Results for Security. - Narrowed by: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300$0026isd$003dtrue?dt=list
2026-01-12T16:32:35Z
Cryptography and network security
ent://SD_ILS/0/SD_ILS:557931
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number TK5102.94 .A44 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:386241
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Kahate, Atul.<br/>Preferred Shelf Number TK5105.59 K12 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:543620
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number QA76.9 .A25 M85 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Manuscrypt : designed for mankind - anthropocentric information security
ent://SD_ILS/0/SD_ILS:579444
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Upadhyaya, Prashant A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527220">https://www.taylorfrancis.com/books/9781003527220</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless security and cryptography : specifications and implementations
ent://SD_ILS/0/SD_ILS:543513
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Sklavos, Nicolas. Zhang, Xinmiao.<br/>Preferred Shelf Number TK5103.2 .W57415 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs
ent://SD_ILS/0/SD_ILS:577899
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Chowdhury, Rajdeep, editor. Niranjan, S. K., editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
State secrecy and security : refiguring the covert imaginary
ent://SD_ILS/0/SD_ILS:572814
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Walters, William, 1964- author.<br/>Preferred Shelf Number JF1525 .S4 W35 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315268972">https://www.taylorfrancis.com/books/9781315268972</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic security solutions for the internet of things
ent://SD_ILS/0/SD_ILS:481771
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Banday, Mohammad Tariq, 1969- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for wireless sensor networks using identity-based cryptography
ent://SD_ILS/0/SD_ILS:544612
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Preferred Shelf Number QA76.9 .A25 P38 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Introduction to modern cryptography
ent://SD_ILS/0/SD_ILS:364315
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Preferred Shelf Number QA76.9.A25 K36 2015<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Algorithmic cryptanalysis
ent://SD_ILS/0/SD_ILS:546057
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Joux, Antoine., author.<br/>Preferred Shelf Number QA76.9 .A43 J693 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420070033">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Public Key Cryptosystems
ent://SD_ILS/0/SD_ILS:560055
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Baş, Esra, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514190">https://www.taylorfrancis.com/books/9781003514190</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modern cryptography with proof techniques and implementations.
ent://SD_ILS/0/SD_ILS:577000
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Hwang, Seong Oun, author. Kim, Intae, author. Lee, Wai Kong, author.<br/>Preferred Shelf Number TK5102.94 .M63 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003152569">https://www.taylorfrancis.com/books/9781003152569</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Applied Cryptography
ent://SD_ILS/0/SD_ILS:546435
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Menezes, Alfred J., author. Katz, Jonathan, author. van Oorschot, Paul C., author. Vanstone, Scott A., author. Taylor and Francis.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soliton Coding for Secured Optical Communication Link
ent://SD_ILS/0/SD_ILS:530297
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Sadegh Amiri, Iraj. author. Alavi, Sayed Ehsan. author. Mahdaliza Idrus, Sevia. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-287-161-9">https://doi.org/10.1007/978-981-287-161-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How i discovered World War II's greatest spy and other stories of intelligence and code
ent://SD_ILS/0/SD_ILS:540734
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Kahn, David, eauthor. Taylor and Francis.<br/>Preferred Shelf Number D810 .S7<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
New directions of modern cryptography
ent://SD_ILS/0/SD_ILS:344263
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-
ent://SD_ILS/0/SD_ILS:146922
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Heiderich, Mario.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos synchronization and cryptography for secure communications applications for encryption
ent://SD_ILS/0/SD_ILS:277940
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Disappearing cryptography information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:146450
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data-driven block ciphers for fast telecommunication systems
ent://SD_ILS/0/SD_ILS:546948
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Moldovyan, Nick., author. Moldovyan, Alex.<br/>Preferred Shelf Number QA76.9 .A25 M664 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Quantum communications and cryptography
ent://SD_ILS/0/SD_ILS:543504
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Sergienko, Alexander V.<br/>Preferred Shelf Number TK5102.94 .Q36 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:301860
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Beginning cryptography with Java
ent://SD_ILS/0/SD_ILS:144203
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Hook, David, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Investigator's guide to steganography
ent://SD_ILS/0/SD_ILS:541281
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Kipper, Gregory., author.<br/>Preferred Shelf Number QA76.9 .A25 K544 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Disappearing cryptography information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:253900
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptography : protocols, algorithms, and source code in C
ent://SD_ILS/0/SD_ILS:108014
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Schneier, Bruce.<br/>Preferred Shelf Number QA76.9.A25 S35 1996<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2026-01-12T16:32:35Z
2026-01-12T16:32:35Z
Author Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>