Arama Sonuçları Data Encryption. - Daraltılmış: ProQuest (Firm)SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bEncryption.$0026qf$003dAUTHOR$002509Yazar$002509ProQuest$002b$002528Firm$002529$002509ProQuest$002b$002528Firm$002529$0026ic$003dtrue$0026ps$003d300?2026-01-17T05:15:07ZSimple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232026-01-17T05:15:07Z2026-01-17T05:15:07Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography protocols, design and applicationsent://SD_ILS/0/SD_ILS:10607492026-01-17T05:15:07Z2026-01-17T05:15:07Zby Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity-based cryptographyent://SD_ILS/0/SD_ILS:9530802026-01-17T05:15:07Z2026-01-17T05:15:07Zby Joye, Marc, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433453">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to identity-based encryptionent://SD_ILS/0/SD_ILS:9452512026-01-17T05:15:07Z2026-01-17T05:15:07Zby Martin, Luther.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338784">Click to View</a><br/>Format: Elektronik Kaynak<br/>Quantum cryptography potentially perfect security.ent://SD_ILS/0/SD_ILS:10920202026-01-17T05:15:07Z2026-01-17T05:15:07Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography cracking codesent://SD_ILS/0/SD_ILS:10153082026-01-17T05:15:07Z2026-01-17T05:15:07Zby Curley, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220658">Click to View</a><br/>Format: Elektronik Kaynak<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:10118942026-01-17T05:15:07Z2026-01-17T05:15:07Zby Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format: Elektronik Kaynak<br/>Machine learning in image steganalysisent://SD_ILS/0/SD_ILS:10010092026-01-17T05:15:07Z2026-01-17T05:15:07Zby Schaathun, Hans Georg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1022347">Click to View</a><br/>Format: Elektronik Kaynak<br/>Burdens of proof cryptographic culture and evidence law in the age of electronic documentsent://SD_ILS/0/SD_ILS:10820422026-01-17T05:15:07Z2026-01-17T05:15:07Zby Blanchette, Jean-François.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339459">Click to View</a><br/>Format: Elektronik Kaynak<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:10207412026-01-17T05:15:07Z2026-01-17T05:15:07Zby Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-01-17T05:15:07Z2026-01-17T05:15:07Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Surveillance or security? the risks posed by new wiretapping technologiesent://SD_ILS/0/SD_ILS:10821532026-01-17T05:15:07Z2026-01-17T05:15:07Zby Landau, Susan Eva.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339582">Click to View</a><br/>Format: Elektronik Kaynak<br/>Privacy on the line the politics of wiretapping and encryptionent://SD_ILS/0/SD_ILS:10813192026-01-17T05:15:07Z2026-01-17T05:15:07Zby Diffie, Whitfield.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338688">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052026-01-17T05:15:07Z2026-01-17T05:15:07Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182026-01-17T05:15:07Z2026-01-17T05:15:07Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-01-17T05:15:07Z2026-01-17T05:15:07Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Quantum cryptography and computing theory and implementationent://SD_ILS/0/SD_ILS:10576622026-01-17T05:15:07Z2026-01-17T05:15:07Zby Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format: Elektronik Kaynak<br/>Video encryption technology and applicationent://SD_ILS/0/SD_ILS:10600892026-01-17T05:15:07Z2026-01-17T05:15:07Zby Xu, Zhengquan, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3020071">Click to View</a><br/>Format: Elektronik Kaynak<br/>Modelling cyber security approaches, methodology, strategiesent://SD_ILS/0/SD_ILS:9625772026-01-17T05:15:07Z2026-01-17T05:15:07Zby NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-01-17T05:15:07Z2026-01-17T05:15:07Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSH strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:9297212026-01-17T05:15:07Z2026-01-17T05:15:07Zby Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format: Elektronik Kaynak<br/>ExamWise for CIW security professional exam 1D0-470ent://SD_ILS/0/SD_ILS:10919422026-01-17T05:15:07Z2026-01-17T05:15:07Zby Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format: Elektronik Kaynak<br/>