Search Results for Data Encryption. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-03-19T12:31:42ZSimple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232026-03-19T12:31:42Z2026-03-19T12:31:42Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Electronic Resources<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142026-03-19T12:31:42Z2026-03-19T12:31:42Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Electronic Resources<br/>Yazılım güvenliği saldırı ve savunmaent://SD_ILS/0/SD_ILS:2915692026-03-19T12:31:42Z2026-03-19T12:31:42Zby Demir, Bünyamin<br/>Format: Books<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312026-03-19T12:31:42Z2026-03-19T12:31:42Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Electronic Resources<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-03-19T12:31:42Z2026-03-19T12:31:42Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122026-03-19T12:31:42Z2026-03-19T12:31:42Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Electronic Resources<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-03-19T12:31:42Z2026-03-19T12:31:42Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Electronic Resources<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322026-03-19T12:31:42Z2026-03-19T12:31:42Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Electronic Resources<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052026-03-19T12:31:42Z2026-03-19T12:31:42Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Electronic Resources<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-03-19T12:31:42Z2026-03-19T12:31:42Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-03-19T12:31:42Z2026-03-19T12:31:42Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Electronic Resources<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-03-19T12:31:42Z2026-03-19T12:31:42Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-03-19T12:31:42Z2026-03-19T12:31:42Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-03-19T12:31:42Z2026-03-19T12:31:42Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632026-03-19T12:31:42Z2026-03-19T12:31:42Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>How to cheat at securing SQL server 2005.ent://SD_ILS/0/SD_ILS:11864752026-03-19T12:31:42Z2026-03-19T12:31:42ZScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Electronic Resources<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-03-19T12:31:42Z2026-03-19T12:31:42Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Electronic Resources<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:4817142026-03-19T12:31:42Z2026-03-19T12:31:42Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Electronic Resources<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-03-19T12:31:42Z2026-03-19T12:31:42Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-03-19T12:31:42Z2026-03-19T12:31:42Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>