Arama Sonuçları Will. - Daraltılmış: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dWill.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ps$003d300?
2026-02-11T22:17:45Z
Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agility
ent://SD_ILS/0/SD_ILS:600179
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Arun, Jai Singh, author. Harishankar, Ray, author. Rjaibi, Walid, author. Diffie, Whitfield, writer of foreword.<br/>Yer Numarası QA76.889<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Safeguarding satellite communications : issues, challenges, and solutions
ent://SD_ILS/0/SD_ILS:600245
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar An, Jianpin, author.<br/>Yer Numarası TK5104 .A53 2026<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigms
ent://SD_ILS/0/SD_ILS:600050
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Tyagi, Amit Kumar, editor.<br/>Yer Numarası T59.6 .N49 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Yer Numarası QA76.9 .A25 E3884 2025<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Lessons from the Frontlines : Insights from a Cybersecurity Career.
ent://SD_ILS/0/SD_ILS:600433
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Keren.<br/>Yer Numarası XX(600433.1)<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Couretas, Jerry M., 1966- author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Mammeri, Zoubir, author.<br/>Yer Numarası QA268 .M34 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Domas, Stephanie, author. Domas, Christopher, author.<br/>Yer Numarası QA76.9 .A25 D66 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yer Numarası HE194 .C93 2024<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Yer Numarası Z104 .S966 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Symmetric cryptography. Volume 2 : Cryptanalysis and future directions
ent://SD_ILS/0/SD_ILS:598806
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Yer Numarası Z104 .S966 2023<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Quantum blockchain : an emerging cryptographic paradigm
ent://SD_ILS/0/SD_ILS:597796
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Dhanaraj, Rajesh Kumar, editor.<br/>Yer Numarası QA76.9 .B56<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Yer Numarası QA76.9 .A25 D38 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25 G75 2021<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Moschovitis, Christos J. P., author.<br/>Yer Numarası HD61.5 .M675 2021 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto
ent://SD_ILS/0/SD_ILS:595556
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Grimes, Roger A., author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Bray, Shannon, 1972-<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Tanner, Nadean H., author.<br/>Yer Numarası QA76.9 .A25 T36 2019 EB<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Handbook of Applied Cryptography
ent://SD_ILS/0/SD_ILS:546435
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Menezes, Alfred J., author. Katz, Jonathan, author. van Oorschot, Paul C., author. Vanstone, Scott A., author. Taylor and Francis.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Bullock, Jessey, author. Gordon, Adam, author.<br/>Yer Numarası QA76.9 .A25<br/>Elektronik Erişim <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
How i discovered World War II's greatest spy and other stories of intelligence and code
ent://SD_ILS/0/SD_ILS:540734
2026-02-11T22:17:45Z
2026-02-11T22:17:45Z
Yazar Kahn, David, eauthor. Taylor and Francis.<br/>Yer Numarası D810 .S7<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>