Search Results for Who - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dWho$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-27T19:59:14Z Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agility ent://SD_ILS/0/SD_ILS:600179 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Arun, Jai Singh, author.&#160;Harishankar, Ray, author.&#160;Rjaibi, Walid, author.&#160;Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number&#160;QA76.889<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:606898 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-71522-9">https://doi.org/10.1007/978-3-030-71522-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cybersecurity A Multidisciplinary Challenge ent://SD_ILS/0/SD_ILS:601841 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Sharp, Robin. author. (orcid)0000-0002-8593-267X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchains A Handbook on Fundamentals, Platforms and Applications ent://SD_ILS/0/SD_ILS:602803 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Ruj, Sushmita. editor.&#160;Kanhere, Salil S. editor.&#160;Conti, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C368 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Applied Cryptography ent://SD_ILS/0/SD_ILS:546435 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Menezes, Alfred J., author.&#160;Katz, Jonathan, author.&#160;van Oorschot, Paul C., author.&#160;Vanstone, Scott A., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Metrics ent://SD_ILS/0/SD_ILS:613251 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Wang, Lingyu. author. (orcid)0000-0002-7441-7541&#160;Jajodia, Sushil. author. (orcid)0000-0003-3210-558X&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:614814 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Rowe, Neil C. author.&#160;Rrushi, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:616141 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Bas, Patrick. author.&#160;Furon, Teddy. author.&#160;Cayre, Fran&ccedil;ois. author.&#160;Do&euml;rr, Gwena&euml;l. author.&#160;Mathon, Benjamin. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How i discovered World War II's greatest spy and other stories of intelligence and code ent://SD_ILS/0/SD_ILS:540734 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Kahn, David, eauthor.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;D810 .S7<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:618599 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records ent://SD_ILS/0/SD_ILS:618605 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Robichau, Bernard Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Hadoop Security ent://SD_ILS/0/SD_ILS:618551 2026-03-27T19:59:14Z 2026-03-27T19:59:14Z Author&#160;Lakhe, Bhushan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6545-0">https://doi.org/10.1007/978-1-4302-6545-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>