Search Results for Social engineering. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSocial$002bengineering.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-29T08:42:39Z Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:613967 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Jakobsson, Markus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605517 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64954-7">https://doi.org/10.1007/978-3-031-64954-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:601805 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64948-6">https://doi.org/10.1007/978-3-031-64948-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings ent://SD_ILS/0/SD_ILS:612065 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Deng, Robert. editor.&#160;Weng, Jian. editor.&#160;Ren, Kui. editor.&#160;Yegneswaran, Vinod. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Bray, Shannon, 1972-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:615982 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Lopez, Javier. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64483-7">https://doi.org/10.1007/978-3-319-64483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:611657 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612151 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Dang, Tran Khanh. editor.&#160;Wagner, Roland. editor.&#160;K&uuml;ng, Josef. editor.&#160;Thoai, Nam. editor.&#160;Takizawa, Makoto. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:614814 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Rowe, Neil C. author.&#160;Rrushi, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethics in Computing A Concise Module ent://SD_ILS/0/SD_ILS:617386 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:617805 2026-03-29T08:42:39Z 2026-03-29T08:42:39Z Author&#160;Diehl, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>