Search Results for Tools. - Narrowed by: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTools.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ps$003d300?2026-04-26T11:13:16ZArchives in the digital age : preservation and the right to be forgottenent://SD_ILS/0/SD_ILS:5967192026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Mkadmi, Abderrazak, author.<br/>Preferred Shelf Number CD973 .D53<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Quantum Nonlinear Function Obfuscation Theory and Applicationent://SD_ILS/0/SD_ILS:6055622026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Shang, Tao. author. (orcid)0000-0003-2369-1521 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-6722-9">https://doi.org/10.1007/978-981-97-6722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mathematical Foundations for Side-Channel Analysis of Cryptographic Systemsent://SD_ILS/0/SD_ILS:6057272026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Cheng, Wei. author. (orcid)0000-0001-9433-7576 Guilley, Sylvain. author. (orcid)0000-0002-5044-3534 Rioul, Olivier. author. (orcid)0000-0002-8681-8916 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-64399-6">https://doi.org/10.1007/978-3-031-64399-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigmsent://SD_ILS/0/SD_ILS:6000502026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number T59.6 .N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Quantum Computing and Quantum Machine Learning for Engineers and Developersent://SD_ILS/0/SD_ILS:6101592026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Van Griensven Thé, Jesse. author. Fraser, Roydon Andrew. author. Rosas-Bustos, Jose. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-98245-3">https://doi.org/10.1007/978-3-031-98245-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Blockchains A Handbook on Fundamentals, Platforms and Applicationsent://SD_ILS/0/SD_ILS:6028032026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Ruj, Sushmita. editor. Kanhere, Salil S. editor. Conti, Mauro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>x86 software reverse-engineering, cracking, and counter-measuresent://SD_ILS/0/SD_ILS:5989202026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Passive and Active Measurement 25th International Conference, PAM 2024, Virtual Event, March 11-13, 2024, Proceedings, Part Ient://SD_ILS/0/SD_ILS:6029472026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Richter, Philipp. editor. Bajpai, Vaibhav. editor. Carisimo, Esteban. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-56249-5">https://doi.org/10.1007/978-3-031-56249-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Symmetric cryptography. Volume 2 : Cryptanalysis and future directionsent://SD_ILS/0/SD_ILS:5988062026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Asymmetric cryptography : primitives and protocolsent://SD_ILS/0/SD_ILS:5980962026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Pointcheval, David, editor.<br/>Preferred Shelf Number QA76.9 .A25 A83 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building secure cars : assuring the automotive software development lifecycleent://SD_ILS/0/SD_ILS:5963102026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Oka, Dennis Kengo, author.<br/>Preferred Shelf Number TL272.53 .O42 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing cryptography using Pythonent://SD_ILS/0/SD_ILS:5961982026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:5962762026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:5954152026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:6161152026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Guilley, Sylvain. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64647-3">https://doi.org/10.1007/978-3-319-64647-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure and Trustworthy Transportation Cyber-Physical Systemsent://SD_ILS/0/SD_ILS:6127542026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Sun, Yunchuan. editor. Song, Houbing. editor. (orcid)0000-0003-2631-9223 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:6136202026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Großmann, Jürgen. editor. Felderer, Michael. editor. Seehusen, Fredrik. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:6115922026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:6116572026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Future Data and Security Engineering 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:6121512026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Dang, Tran Khanh. editor. Wagner, Roland. editor. Küng, Josef. editor. Thoai, Nam. editor. Takizawa, Makoto. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-70004-5">https://doi.org/10.1007/978-3-319-70004-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:6131892026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Robshaw, Matthew. editor. Katz, Jonathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:6159752026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Robshaw, Matthew. editor. Katz, Jonathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SOFSEM 2016: Theory and Practice of Computer Science 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:6162842026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Freivalds, Rūsiņš Mārtiņš. editor. Engels, Gregor. editor. Catania, Barbara. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-49192-8">https://doi.org/10.1007/978-3-662-49192-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:6163002026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Robshaw, Matthew. editor. Katz, Jonathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:6169432026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Peyrin, Thomas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Understanding Social Engineering Based Scamsent://SD_ILS/0/SD_ILS:6139672026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Jakobsson, Markus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:6115492026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:6161502026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Standaert, François-Xavier. editor. Oswald, Elisabeth. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethics in Computing A Concise Moduleent://SD_ILS/0/SD_ILS:6173862026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Recordsent://SD_ILS/0/SD_ILS:6186052026-04-26T11:13:16Z2026-04-26T11:13:16ZAuthor Robichau, Bernard Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>