Search Results for Data Encryption. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2026-03-19T12:31:42Z Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:1007623 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:1132914 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Yaz&#305;l&#305;m g&uuml;venli&#287;i sald&#305;r&#305; ve savunma ent://SD_ILS/0/SD_ILS:291569 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Demir, B&uuml;nyamin<br/>Format:&#160;Books<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:1053831 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:1027312 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:936705 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Electronic Resources<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:480290 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing SQL server 2005. ent://SD_ILS/0/SD_ILS:1186475 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2026-03-19T12:31:42Z 2026-03-19T12:31:42Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Electronic Resources<br/>