Arama Sonuçları Cryptography - Daraltılmış: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCryptography$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list2025-12-08T05:20:46ZCryptography for developersent://SD_ILS/0/SD_ILS:1476862025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar St. Denis, Tom. Johnson, Simon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">http://www.sciencedirect.com/science/book/9781597491044</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to cryptographyent://SD_ILS/0/SD_ILS:1063012025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Buchmann, Johannes.<br/>Yer Numarası QA268 B83 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Introduction to cryptographyent://SD_ILS/0/SD_ILS:935362025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Buchmann, Johannes.<br/>Yer Numarası QA 268 .B83 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:3643152025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Katz, Jonathan, 1974- Lindell, Yehuda.<br/>Yer Numarası QA76.9.A25 K36 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3862412025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Kahate, Atul.<br/>Yer Numarası TK5105.59 K12 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Quantum communications and cryptographyent://SD_ILS/0/SD_ILS:5435042025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Sergienko, Alexander V.<br/>Yer Numarası TK5102.94 .Q36 2005<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Beginning cryptography with Javaent://SD_ILS/0/SD_ILS:1442032025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Hook, David, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of Applied Cryptographyent://SD_ILS/0/SD_ILS:5464352025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Menezes, Alfred J., author. Katz, Jonathan, author. van Oorschot, Paul C., author. Vanstone, Scott A., author. Taylor and Francis.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:2968652025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Konheim, Alan G., 1934-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>An introduction to number theory with cryptographyent://SD_ILS/0/SD_ILS:3646482025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Kraft, James S., author. Washington, Lawrence C., author.<br/>Yer Numarası QA241 K73 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:3442632025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Cao, Zhenfu.<br/>Yer Numarası ONLINE(344263.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Quantum Cryptography and Secret-Key Distillationent://SD_ILS/0/SD_ILS:2351402025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Assche, Gilles van .<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Everyday Cryptography Fundamental Principles and Applicationsent://SD_ILS/0/SD_ILS:2792112025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Martin, Keith M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:1464502025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Wayner, Peter, 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Elliptic curves : number theory and cryptographyent://SD_ILS/0/SD_ILS:5390082025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Washington, Lawrence C., author.<br/>Yer Numarası QA567.2 .E44 W37 2008<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420071474">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Information theory, coding and cryptographyent://SD_ILS/0/SD_ILS:3861372025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Bose, Ranjan.<br/>Yer Numarası QA268 B743 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:2539002025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Wayner, Peter, 1964-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>An introduction to number theory with cryptographyent://SD_ILS/0/SD_ILS:5440892025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Kraft, James S., eauthor. Washington, Lawrence C., author. Taylor and Francis.<br/>Yer Numarası QA241<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781482214420">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Wireless security and cryptography : specifications and implementationsent://SD_ILS/0/SD_ILS:5435132025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Sklavos, Nicolas. Zhang, Xinmiao.<br/>Yer Numarası TK5103.2 .W57415 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Java cryptography extensions practical guide for programmersent://SD_ILS/0/SD_ILS:2537972025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Weiss, Jason (Jason R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127427515">http://www.sciencedirect.com/science/book/9780127427515</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security for wireless sensor networks using identity-based cryptographyent://SD_ILS/0/SD_ILS:5446122025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Patil, Harsh Kupwade., author. Szygenda, Stephen A.<br/>Yer Numarası QA76.9 .A25 P38 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Chaos synchronization and cryptography for secure communications applications for encryptionent://SD_ILS/0/SD_ILS:2779402025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Banerjee, Santo, 1976- IGI Global.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1080142025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Schneier, Bruce.<br/>Yer Numarası QA76.9.A25 S35 1996<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Algorithmic cryptanalysisent://SD_ILS/0/SD_ILS:5460572025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Joux, Antoine., author.<br/>Yer Numarası QA76.9 .A43 J693 2009<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420070033">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Crypto and AI From Coevolution to Quantum Revolutionent://SD_ILS/0/SD_ILS:5287612025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Zolfaghari, Behrouz. author. Nemati, Hamid. author. Yanai, Naoto. author. Bibak, Khodakhast. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-44807-2">https://doi.org/10.1007/978-3-031-44807-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A Nature-Inspired Approach to Cryptologyent://SD_ILS/0/SD_ILS:5289522025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Shandilya, Shishir Kumar. author. Datta, Agni. author. Nagar, Atulya K. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-99-7081-0">https://doi.org/10.1007/978-981-99-7081-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Kriptografi ile sayılar teorisine girişent://SD_ILS/0/SD_ILS:5140742025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Kraft, James R. Terziler, Mehmet.<br/>Yer Numarası QA241 K7319 2022<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cryptographic security solutions for the internet of thingsent://SD_ILS/0/SD_ILS:4817712025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Banday, Mohammad Tariq, 1969- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:4587882025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Shavers, Brett, author. Bair, John, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128033401">https://www.sciencedirect.com/science/book/9780128033401</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Audio Watermarking Based on Singular Value Decompositionent://SD_ILS/0/SD_ILS:5302602025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Dhar, Pranab Kumar. author. Shimamura, Tetsuya. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-14800-7">https://doi.org/10.1007/978-3-319-14800-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Soliton Coding for Secured Optical Communication Linkent://SD_ILS/0/SD_ILS:5302972025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Sadegh Amiri, Iraj. author. Alavi, Sayed Ehsan. author. Mahdaliza Idrus, Sevia. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-287-161-9">https://doi.org/10.1007/978-981-287-161-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:5436202025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Yer Numarası QA76.9 .A25 M85 2015<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>How i discovered World War II's greatest spy and other stories of intelligence and codeent://SD_ILS/0/SD_ILS:5407342025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Kahn, David, eauthor. Taylor and Francis.<br/>Yer Numarası D810 .S7<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1469222025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Heiderich, Mario.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:2980252025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Konheim, Alan G., 1934-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:1475302025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Cusick, Thomas W., 1943- Stănică, Pantelimon.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied cryptanalysis breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:2495082025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Stamp, Mark. Low, Richard M., 1967-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data-driven block ciphers for fast telecommunication systemsent://SD_ILS/0/SD_ILS:5469482025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Moldovyan, Nick., author. Moldovyan, Alex.<br/>Yer Numarası QA76.9 .A25 M664 2007<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Authentication codes and combinatorial designsent://SD_ILS/0/SD_ILS:5470492025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Pei, Dingyi., author.<br/>Yer Numarası QA76.9 .A25 P42 2006<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781420003185">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Investigator's guide to steganographyent://SD_ILS/0/SD_ILS:5412812025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Kipper, Gregory., author.<br/>Yer Numarası QA76.9 .A25 K544 2004<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>Einführung in die Kryptographieent://SD_ILS/0/SD_ILS:3873282025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Buchmann, Johannes.<br/>Yer Numarası QA268 B84 2004<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Codes and Ciphers Julius Caesar, the Enigma, and the Internetent://SD_ILS/0/SD_ILS:2381992025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Churchhouse, R. F..<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511542978">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Contemporary cryptology the science of information integrityent://SD_ILS/0/SD_ILS:2496612025-12-08T05:20:46Z2025-12-08T05:20:46ZYazar Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>