Search Results for Who - Narrowed by: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dWho$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-27T19:59:14ZHacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agilityent://SD_ILS/0/SD_ILS:6001792026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Arun, Jai Singh, author. Harishankar, Ray, author. Rjaibi, Walid, author. Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number QA76.889<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Cryptography, Security and Privacyent://SD_ILS/0/SD_ILS:6068982026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X Samarati, Pierangela. editor. Yung, Moti. editor. (orcid)0000-0003-0848-0873 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-71522-9">https://doi.org/10.1007/978-3-030-71522-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>x86 software reverse-engineering, cracking, and counter-measuresent://SD_ILS/0/SD_ILS:5989202026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Cybersecurity A Multidisciplinary Challengeent://SD_ILS/0/SD_ILS:6018412026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Sharp, Robin. author. (orcid)0000-0002-8593-267X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Blockchains A Handbook on Fundamentals, Platforms and Applicationsent://SD_ILS/0/SD_ILS:6028032026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Ruj, Sushmita. editor. Kanhere, Salil S. editor. Conti, Mauro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking multifactor authenticationent://SD_ILS/0/SD_ILS:5963262026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:5954152026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of Applied Cryptographyent://SD_ILS/0/SD_ILS:5464352026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Menezes, Alfred J., author. Katz, Jonathan, author. van Oorschot, Paul C., author. Vanstone, Scott A., author. Taylor and Francis.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Security Metricsent://SD_ILS/0/SD_ILS:6132512026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Wang, Lingyu. author. (orcid)0000-0002-7441-7541 Jajodia, Sushil. author. (orcid)0000-0003-3210-558X Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:6107882026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Colbert, Edward J. M. editor. Kott, Alexander. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:6148142026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Rowe, Neil C. author. Rrushi, Julian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:6161412026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Bas, Patrick. author. Furon, Teddy. author. Cayre, François. author. Doërr, Gwenaël. author. Mathon, Benjamin. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How i discovered World War II's greatest spy and other stories of intelligence and codeent://SD_ILS/0/SD_ILS:5407342026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Kahn, David, eauthor. Taylor and Francis.<br/>Preferred Shelf Number D810 .S7<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:6185842026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Ruan, Xiaoyu. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Valueent://SD_ILS/0/SD_ILS:6185992026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Dennedy, Michelle. author. Fox, Jonathan. author. Finneran, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Recordsent://SD_ILS/0/SD_ILS:6186052026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Robichau, Bernard Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical Hadoop Securityent://SD_ILS/0/SD_ILS:6185512026-03-27T19:59:14Z2026-03-27T19:59:14ZAuthor Lakhe, Bhushan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6545-0">https://doi.org/10.1007/978-1-4302-6545-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>