Arama Sonu&ccedil;lar&#305; Data Encryption. - Daralt&#305;lm&#305;&#351;: Ebook Central SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bEncryption.$0026qf$003dLOCATION$002509Lokasyon$0025091$00253AEBOOKCENT$002509Ebook$002bCentral$0026ps$003d300;jsessionid=521CD50779AD73DA8D95DBA260D81433? 2026-01-24T19:09:54Z Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:1007623 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1124950 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information hiding ent://SD_ILS/0/SD_ILS:1124313 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:1132914 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography protocols, design and applications ent://SD_ILS/0/SD_ILS:1060749 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity-based cryptography ent://SD_ILS/0/SD_ILS:953080 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Joye, Marc, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433453">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to identity-based encryption ent://SD_ILS/0/SD_ILS:945251 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Martin, Luther.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338784">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Quantum cryptography potentially perfect security. ent://SD_ILS/0/SD_ILS:1092020 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Color image watermarking : algorithms and technologies ent://SD_ILS/0/SD_ILS:1122563 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Su, Qingtang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4790352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond ent://SD_ILS/0/SD_ILS:1042993 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Salam, Abdul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895695">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography cracking codes ent://SD_ILS/0/SD_ILS:1015308 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Curley, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:1011894 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:1120646 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:1053831 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Machine learning in image steganalysis ent://SD_ILS/0/SD_ILS:1001009 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Schaathun, Hans Georg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1022347">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security of block ciphers : from algorithm design to hardware implementation ent://SD_ILS/0/SD_ILS:1103007 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Sakiyama, Kazuo, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4037343">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:1020741 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Burdens of proof cryptographic culture and evidence law in the age of electronic documents ent://SD_ILS/0/SD_ILS:1082042 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Blanchette, Jean-Fran&ccedil;ois.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339459">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:1027312 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Surveillance or security? the risks posed by new wiretapping technologies ent://SD_ILS/0/SD_ILS:1082153 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Landau, Susan Eva.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339582">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Privacy on the line the politics of wiretapping and encryption ent://SD_ILS/0/SD_ILS:1081319 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Diffie, Whitfield.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338688">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:936705 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:931018 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Guide to pairing-based cryptography ent://SD_ILS/0/SD_ILS:1140799 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Video encryption technology and application ent://SD_ILS/0/SD_ILS:1060089 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Xu, Zhengquan, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3020071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Quantum cryptography and computing theory and implementation ent://SD_ILS/0/SD_ILS:1057662 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Modelling cyber security approaches, methodology, strategies ent://SD_ILS/0/SD_ILS:962577 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSH strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:929721 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ExamWise for CIW security professional exam 1D0-470 ent://SD_ILS/0/SD_ILS:1091942 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The Energy Internet : An Open Energy Platform to Transform Legacy Power Systems into Open Innovation and Global Economic Engines. ent://SD_ILS/0/SD_ILS:1152708 2026-01-24T19:09:54Z 2026-01-24T19:09:54Z by&#160;Su, Wencong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5568986">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>