Arama Sonuçları Tools - Daraltılmış: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dTools$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2026-01-22T10:47:07ZArchives in the digital age : preservation and the right to be forgottenent://SD_ILS/0/SD_ILS:5967192026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Mkadmi, Abderrazak, author.<br/>Yer Numarası CD973 .D53<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119825029</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigmsent://SD_ILS/0/SD_ILS:6000502026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Tyagi, Amit Kumar, editor.<br/>Yer Numarası T59.6 .N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber defense : best practices for digital safetyent://SD_ILS/0/SD_ILS:6000032026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Edwards, Jason, author.<br/>Yer Numarası QA76.9 .A25 E39 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Yer Numarası QA76.9 .A25 H84 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>x86 software reverse-engineering, cracking, and counter-measuresent://SD_ILS/0/SD_ILS:5989202026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Domas, Stephanie, author. Domas, Christopher, author.<br/>Yer Numarası QA76.9 .A25 D66 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Symmetric cryptography. Volume 2 : Cryptanalysis and future directionsent://SD_ILS/0/SD_ILS:5988062026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Yer Numarası Z104 .S966 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Asymmetric cryptography : primitives and protocolsent://SD_ILS/0/SD_ILS:5980962026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Pointcheval, David, editor.<br/>Yer Numarası QA76.9 .A25 A83 2022<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building secure cars : assuring the automotive software development lifecycleent://SD_ILS/0/SD_ILS:5963102026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Oka, Dennis Kengo, author.<br/>Yer Numarası TL272.53 .O42 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119710783</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:5962762026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Yer Numarası QA76.9 .A25 C3673 2020<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing cryptography using Pythonent://SD_ILS/0/SD_ILS:5961982026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Bray, Shannon, 1972-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:5954152026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Yer Numarası QA76.9 .A25 C368 2019<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Tanner, Nadean H., author.<br/>Yer Numarası QA76.9 .A25 T36 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking the hacker : learn from the experts who take down hackersent://SD_ILS/0/SD_ILS:5936362026-01-22T10:47:07Z2026-01-22T10:47:07ZYazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>