Arama Sonuçları Data Encryption. - Daraltılmış: Chiffrement (Informatique)
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Konu$002509Chiffrement$002b$002528Informatique$002529$002509Chiffrement$002b$002528Informatique$002529$0026ps$003d300?
2026-01-20T15:50:48Z
Embedded Cryptography. 3
ent://SD_ILS/0/SD_ILS:599815
2026-01-20T15:50:48Z
2026-01-20T15:50:48Z
Yazar Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Applied satisfiability : cryptography, scheduling and coalitional games
ent://SD_ILS/0/SD_ILS:599624
2026-01-20T15:50:48Z
2026-01-20T15:50:48Z
Yazar Liao, Xiaojuan, author. Koshimura, Miyuki, author.<br/>Yer Numarası QA76.9 .A3 L53 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Embedded cryptography. 1
ent://SD_ILS/0/SD_ILS:599697
2026-01-20T15:50:48Z
2026-01-20T15:50:48Z
Yazar Prouff, Emmanuel, editor. Renault, Guenael. Rivain, Mattieu. O'Flynn, Colin.<br/>Yer Numarası QA76.9 .A25 E43 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Embedded cryptography 2
ent://SD_ILS/0/SD_ILS:599724
2026-01-20T15:50:48Z
2026-01-20T15:50:48Z
Yazar Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Asymmetric cryptography : primitives and protocols
ent://SD_ILS/0/SD_ILS:598096
2026-01-20T15:50:48Z
2026-01-20T15:50:48Z
Yazar Pointcheval, David, editor.<br/>Yer Numarası QA76.9 .A25 A83 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts
ent://SD_ILS/0/SD_ILS:597703
2026-01-20T15:50:48Z
2026-01-20T15:50:48Z
Yazar Poston, Howard E., III, author.<br/>Yer Numarası QA76.9 .B56 P67 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto
ent://SD_ILS/0/SD_ILS:595556
2026-01-20T15:50:48Z
2026-01-20T15:50:48Z
Yazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-01-20T15:50:48Z
2026-01-20T15:50:48Z
Yazar Bray, Shannon, 1972-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>