Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
8
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Cryptography.
Yazar
Dahil
Hariç
Carey, Marcus J. (Cybersecurity professional), author.
(3)
Grimes, Roger A., author.
(3)
Jin, Jennifer, author.
(2)
Jin, Jennifer.
(2)
Prouff, Emmanuel, editor.
(2)
Taylor and Francis.
(2)
Alencar, Marcelo S., 1957- author.
(1)
An, Jianpin, author.
(1)
Anand, R. S., author.
(1)
Arun, Jai Singh, author.
(1)
Baliyan, Anupam, 1976- author.
(1)
Baş, Esra, author.
(1)
Bray, Shannon, 1972-
(1)
Bruen, Aiden A., 1941-
(1)
Bullock, Jessey, author.
(1)
Carey, Marcus J. (Cybersecurity professional)
(1)
Chowdhury, Rajdeep, editor.
(1)
Couretas, Jerry M., 1966- author.
(1)
David, Shiblin, author.
(1)
Dhanaraj, Rajesh Kumar, editor.
(1)
Dhatterwal, Jagjit Singh, author.
(1)
Diffie, Whitfield, writer of foreword.
(1)
Domas, Christopher, author.
(1)
Domas, Stephanie, author.
(1)
Edwards, Jason (Cybersecurity expert), author.
(1)
Edwards, Jason, author.
(1)
Forcinito, Mario, 1962-
(1)
Fréminville, Marie de, author.
(1)
Furneaux, Nick, author.
(1)
Gjosteen, Kristian.
(1)
Gordon, Adam, author.
(1)
Guerrier, Claudine, author.
(1)
Harishankar, Ray, author.
(1)
Hook, David, 1962-
(1)
Hughes, Chris (Christopher Matthew), author.
(1)
Hwang, Seong Oun, author.
(1)
Jeyakrishnan, V., author.
(1)
John Wiley & Sons, publisher.
(1)
Kahn, David, eauthor.
(1)
Kamhoua, Charles A., edtior.
(1)
Kaswan, Kuldeep Singh, author.
(1)
Katz, Jonathan, author.
(1)
Keren.
(1)
Kim, Intae, author.
(1)
Knight, Alissa, author.
(1)
Knottenbelt, William J., writer of foreword.
(1)
Kumar, Keshav (Engineer), editor.
(1)
Lambros, Kyriakos P., author.
(1)
Lee, Wai Kong, author.
(1)
Li, Hu, author.
(1)
Mammeri, Zoubir, author.
(1)
Menezes, Alfred J., author.
(1)
Mkadmi, Abderrazak, author.
(1)
Moschovitis, Christos J. P., author.
(1)
Niranjan, S. K., editor.
(1)
Niranjanamurthy, M., author.
(1)
Njilla, Laurent L., editor.
(1)
O'Flynn, Colin, editor.
(1)
O'Flynn, Colin.
(1)
Oka, Dennis Kengo, author.
(1)
Pandey, Bishwajeet, editor.
(1)
Quade, Phil.
(1)
Rani, Shalli, author.
(1)
Renault, Guenael, editor.
(1)
Renault, Guenael.
(1)
Rivain, Mattieu, editor.
(1)
Rivain, Mattieu.
(1)
Rjaibi, Walid, author.
(1)
Robinson, Nikki, author.
(1)
Sharp, Matthew K., author.
(1)
Shetty, Sachin, editor.
(1)
Tanner, Nadean H., author.
(1)
Tounsi, Wiem, editor.
(1)
Tyagi, Amit Kumar, editor.
(1)
Upadhyaya, Prashant A., author.
(1)
Vanstone, Scott A., author.
(1)
Wang, Han, author.
(1)
van Oorschot, Paul C., author.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(49)
Yayın Yılı
Dahil
Hariç
-
2025
(10)
2021
(7)
2019
(6)
2020
(6)
2022
(5)
2024
(5)
2005
(2)
2017
(2)
2018
(2)
2026
(2)
1997
(1)
2014
(1)
2023
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(34)
Security.
(34)
COMPUTERS.
(32)
Computer security.
(23)
Sécurité informatique.
(22)
Computer Security
(10)
Networking.
(9)
COMPUTERS -- Security -- General.
(7)
Cryptographie.
(7)
Data encryption (Computer science)
(7)
Computer security
(6)
COMPUTERS -- Security -- Cryptography & Encryption.
(5)
COMPUTERS / Cryptography
(5)
Computer networks -- Security measures.
(5)
Data protection.
(5)
COMPUTERS -- Security -- Cryptography.
(4)
Chiffrement (Informatique)
(4)
Cryptography
(4)
Hacking.
(4)
Informatique quantique.
(4)
Piratage informatique.
(4)
Protection de l'information (Informatique)
(4)
Quantum computing.
(4)
Blockchains (Databases)
(3)
Chaînes de blocs.
(3)
Computer networks -- Security measures
(3)
Computers
(3)
Computers.
(3)
Data protection
(3)
Hacking
(3)
Ordinateurs.
(3)
Quantum computing
(3)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(3)
Viruses & Malware.
(3)
BUSINESS & ECONOMICS.
(2)
Business enterprises -- Security measures
(2)
Business enterprises -- Security measures.
(2)
COMPUTERS -- Internet -- Security.
(2)
COMPUTERS -- Networking -- Security.
(2)
COMPUTERS / Information Technology
(2)
COMPUTERS / Networking / Security
(2)
COMPUTERS / Security / General
(2)
Computers -- Access control.
(2)
Cybernetics.
(2)
Electronic digital computers
(2)
Electronic digital computers.
(2)
Entreprises -- Sécurité -- Mesures.
(2)
Penetration testing (Computer security)
(2)
Tests d'intrusion.
(2)
31.48 calculus of variations.
(1)
53.71 information, communication and signal theories.
(1)
54.10 theoretical informatics.
(1)
Architecture logicielle.
(1)
Archives
(1)
Archives.
(1)
Artificial satellites in telecommunication -- Security measures.
(1)
Assembly Language.
(1)
Automated vehicles
(1)
Automated vehicles -- Security measures.
(1)
Automated vehicles.
(1)
Automotive computers -- Programming.
(1)
Automotive telematics -- Security measures.
(1)
BUSINESS & ECONOMICS -- Finance.
(1)
Behavioral cybersecurity.
(1)
Bibliothèques virtuelles.
(1)
Business -- Data processing -- Security measures
(1)
Business -- Data processing -- Security measures.
(1)
Business enterprises -- Data processing -- Security measures.
(1)
COMPUTERS / Artificial Intelligence
(1)
COMPUTERS / Computer Engineering
(1)
COMPUTERS / Operating Systems / General.
(1)
COMPUTERS / Programming / Systems Analysis & Design
(1)
COMPUTERS / Security / Cryptography.
(1)
COMPUTERS / Security / General.
(1)
Chefs des services de l'information.
(1)
Chief information officers
(1)
Chief information officers.
(1)
Cloud computing -- Security measures.
(1)
Computational intelligence -- Industrial applications.
(1)
Computer Science.
(1)
Computer crimes -- Investigation
(1)
Computer crimes -- Investigation.
(1)
Computer security -- Management
(1)
Computer security -- Management.
(1)
Computers -- Access control -- Handbooks, manuals, etc.
(1)
Computers -- Access control -- Testing
(1)
Computers -- Access control -- Testing.
(1)
Computersicherheit
(1)
Computersicherheit -- Theoretische Informatik.
(1)
Criminal investigation -- Technological innovations
(1)
Criminal investigation -- Technological innovations.
(1)
Criminalité informatique -- Enquêtes.
(1)
Criptologia.
(1)
Cryptography -- Handbooks, manuals, etc.
(1)
Cyberinfrastructure -- Security measures.
(1)
Data transmission systems -- Security measures.
(1)
Digital libraries
(1)
Digital libraries.
(1)
Distributed Systems & Computing.
(1)
Electronic commerce
(1)
Electronic funds transfers
(1)
Electronic funds transfers -- Corrupt practices
(1)
Electronic funds transfers -- Corrupt practices.
(1)
Electronic intelligence.
(1)
Enquêtes criminelles -- Innovations.
(1)
Entreprises -- Informatique -- Sécurité -- Mesures.
(1)
Fehlerkorrekturcode
(1)
Fehlerkorrigierender Code.
(1)
Finance.
(1)
Financial Risk Management.
(1)
Gestion -- Informatique -- Sécurité -- Mesures.
(1)
Gestion du risque.
(1)
Hackers
(1)
Hackers.
(1)
Industrie 4.0.
(1)
Industry 4.0
(1)
Industry 4.0.
(1)
Industry 5.0.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information technology -- Security measures
(1)
Information technology -- Security measures -- Management.
(1)
Information technology -- Security measures.
(1)
Information theory.
(1)
Informationstheorie -- 0 Gesamtdarstellung.
(1)
Insurance.
(1)
Intelligence (AI) & Semantics.
(1)
Internet auctions -- Security measures.
(1)
Internet des objets -- Sécurité -- Mesures.
(1)
Internet of things -- Industrial applications.
(1)
Internet of things -- Security measures.
(1)
Java (Computer program language)
(1)
Kryptologie
(1)
Kryptologie -- 0 Gesamtdarstellung.
(1)
MATHEMATICS / Applied
(1)
MATHEMATICS / Linear Programming
(1)
Management information systems -- Security measures.
(1)
Military intelligence.
(1)
Mobile & Wireless Communications.
(1)
Online Safety & Privacy.
(1)
Optical Data Processing.
(1)
Optimization.
(1)
Ordinateurs de bord -- Programmation.
(1)
POLITICAL SCIENCE / Political Freedom & Security / International Security.
(1)
Pirates informatiques.
(1)
Programming Languages.
(1)
Public key infrastructure (Computer security)
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Records
(1)
Records.
(1)
Reverse engineering.
(1)
Risk Assessment & Management.
(1)
Risk management
(1)
Risk management.
(1)
Rétro-ingénierie.
(1)
Satellites artificiels dans les télécommunications -- Sécurité -- Mesures.
(1)
Secret code.
(1)
Signals & Signal Processing.
(1)
Software architecture.
(1)
Systems Architecture.
(1)
Systèmes d'information de gestion -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications -- Sécurité -- Mesures.
(1)
Systèmes de télécommunications.
(1)
Sécurité informatique -- Gestion.
(1)
TECHNOLOGY & ENGINEERING.
(1)
TECHNOLOGY / Electricity
(1)
TECHNOLOGY / Electronics / General
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures.
(1)
Technologie de l'information.
(1)
Telecommunication systems
(1)
Telecommunication systems -- Security measures
(1)
Telecommunication systems -- Security measures.
(1)
Telecommunication systems.
(1)
Telekommunikation
(1)
Teoria da informação.
(1)
Theoretische Informatik -- Computersicherheit.
(1)
Transferts électroniques de fonds -- Pratiques déloyales.
(1)
Transport -- Sécurité -- Mesures.
(1)
Transportation -- Security measures.
(1)
Télématique automobile -- Sécurité -- Mesures.
(1)
Vente aux enchères sur Internet -- Sécurité -- Mesures.
(1)
Véhicules autonomes -- Sécurité -- Mesures.
(1)
Véhicules autonomes.
(1)
World War, 1939-1945 -- Cryptography.
(1)
World War, 1939-1945 -- Electronic intelligence.
(1)
World War, 1939-1945 -- Military intelligence.
(1)
X86 assembly language (Computer program language)
(1)
X86 assembly language (Langage de programmation)
(1)
information technology.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
CRC Ekitapları
Elektronik Kütüphane
Taylor Francis E-Kitap Koleksiyonu
Wiley E-Kitap Koleksiyonu
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
49 sonuç bulundu
1
2
3
4
5
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
1.
Cryptography, information theory, and error-correction : a handbook for the 21st century
Cryptography, information theory, and error-correction : a handbook for the 21st century
Yazar
Bruen, Aiden A., 1941- Forcinito, Mario, 1962-
Yer Numarası
QA76.9 .A25 B79 2005
Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2
3
4
5