Arama Sonuçları Data Encryption. - Daraltılmış: Data transmission systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Konu$002509Data$002btransmission$002bsystems.$002509Data$002btransmission$002bsystems.$0026ps$003d300?dt=list
2025-12-06T03:51:03Z
Advances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:400161
2025-12-06T03:51:03Z
2025-12-06T03:51:03Z
Yazar Shacham, Hovav. editor. Boldyreva, Alexandra. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-96881-0">https://doi.org/10.1007/978-3-319-96881-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Noiseless steganography : the key to covert communications
ent://SD_ILS/0/SD_ILS:546597
2025-12-06T03:51:03Z
2025-12-06T03:51:03Z
Yazar Desoky, Abdelrahman., author.<br/>Yer Numarası QA268 .D47 2012<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781439846223">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>
Forensic Computing
ent://SD_ILS/0/SD_ILS:175532
2025-12-06T03:51:03Z
2025-12-06T03:51:03Z
Yazar Sammes, Tony. author. Jenkinson, Brian. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-84628-732-9">http://dx.doi.org/10.1007/978-1-84628-732-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A Classical Introduction to Cryptography Applications for Communications Security
ent://SD_ILS/0/SD_ILS:165205
2025-12-06T03:51:03Z
2025-12-06T03:51:03Z
Yazar Vaudenay, Serge. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
A Classical Introduction to Cryptography Exercise Book
ent://SD_ILS/0/SD_ILS:165571
2025-12-06T03:51:03Z
2025-12-06T03:51:03Z
Yazar Baigèneres, Thomas. author. Lu, Yi. author. Vaudenay, Serge. author. Junod, Pascal. author. Monnerat, Jean. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer Viruses and Malware
ent://SD_ILS/0/SD_ILS:166010
2025-12-06T03:51:03Z
2025-12-06T03:51:03Z
Yazar Aycock, John. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Multimedia Encryption and Watermarking
ent://SD_ILS/0/SD_ILS:165226
2025-12-06T03:51:03Z
2025-12-06T03:51:03Z
Yazar Furht, Borko. author. Muharemagic, Edin. author. Socek, Daniel. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>