Arama Sonuçları Authentication. - Daraltılmış: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dAuthentication.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ps$003d300?
2026-02-26T07:03:15Z
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25 G75 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Authentication codes and combinatorial designs
ent://SD_ILS/0/SD_ILS:547049
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Pei, Dingyi., author.<br/>Yer Numarası QA76.9 .A25 P42 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Edwards, Jason, author.<br/>Yer Numarası QA76.9 .A25 E39 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Yer Numarası Z104 .S966 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Asymmetric cryptography : primitives and protocols
ent://SD_ILS/0/SD_ILS:598096
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Pointcheval, David, editor.<br/>Yer Numarası QA76.9 .A25 A83 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Yer Numarası QA76.9 .A25 D38 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Bray, Shannon, 1972-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Quade, Phil.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security for wireless sensor networks using identity-based cryptography
ent://SD_ILS/0/SD_ILS:544612
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Yer Numarası QA76.9 .A25 P38 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireless security and cryptography : specifications and implementations
ent://SD_ILS/0/SD_ILS:543513
2026-02-26T07:03:15Z
2026-02-26T07:03:15Z
Yazar Sklavos, Nicolas. Zhang, Xinmiao.<br/>Yer Numarası TK5103.2 .W57415 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>