Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: English - Computer security. - Cryptography. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300? 2024-06-24T21:12:59Z Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:137209 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektronik Kaynak<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The history of information security : a comprehensive handbook ent://SD_ILS/0/SD_ILS:1186523 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format:&#160;Elektronik Kaynak<br/> Basics of contemporary cryptography for IT practitioners ent://SD_ILS/0/SD_ILS:939979 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Ryabko, Boris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=296069">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:931287 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intelligent watermarking techniques ent://SD_ILS/0/SD_ILS:931269 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Pan, Jeng-Shyang.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231561">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> zSeries Trusted Key Entry (TKE) version 4.2 update ent://SD_ILS/0/SD_ILS:1075371 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306676">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM eserver zSeries 990 (z990) cryptography implementation ent://SD_ILS/0/SD_ILS:1075486 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306791">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> zSeries crypto guide update ent://SD_ILS/0/SD_ILS:1075400 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306705">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2024-06-24T21:12:59Z 2024-06-24T21:12:59Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>