Arama Sonu&ccedil;lar&#305; Computer networks -- Data Security. - Daralt&#305;lm&#305;&#351;: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bnetworks$002b--$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list 2026-03-24T04:42:49Z Introduction to Biometrics ent://SD_ILS/0/SD_ILS:605790 2026-03-24T04:42:49Z 2026-03-24T04:42:49Z Yazar&#160;Jain, Anil K. author.&#160;Ross, Arun A. author. (orcid)0000-0001-8850-3013&#160;Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725&#160;Swearingen, Thomas. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-03-24T04:42:49Z 2026-03-24T04:42:49Z Yazar&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Yer Numaras&#305;&#160;HD30.2 .S5325 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>