Arama Sonu&ccedil;lar&#305; Data Encryption. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bEncryption.$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-30T14:55:15Z Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:1007623 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1124950 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information hiding ent://SD_ILS/0/SD_ILS:1124313 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:1132914 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography protocols, design and applications ent://SD_ILS/0/SD_ILS:1060749 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity-based cryptography ent://SD_ILS/0/SD_ILS:953080 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Joye, Marc, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433453">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to identity-based encryption ent://SD_ILS/0/SD_ILS:945251 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Martin, Luther.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338784">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Quantum cryptography potentially perfect security. ent://SD_ILS/0/SD_ILS:1092020 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Color image watermarking : algorithms and technologies ent://SD_ILS/0/SD_ILS:1122563 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Su, Qingtang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4790352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond ent://SD_ILS/0/SD_ILS:1042993 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Salam, Abdul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895695">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography cracking codes ent://SD_ILS/0/SD_ILS:1015308 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Curley, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:1011894 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Yaz&#305;l&#305;m g&uuml;venli&#287;i sald&#305;r&#305; ve savunma ent://SD_ILS/0/SD_ILS:291569 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Demir, B&uuml;nyamin<br/>Format:&#160;Kitap<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:1120646 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:1053831 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Machine learning in image steganalysis ent://SD_ILS/0/SD_ILS:1001009 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Schaathun, Hans Georg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1022347">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security of block ciphers : from algorithm design to hardware implementation ent://SD_ILS/0/SD_ILS:1103007 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Sakiyama, Kazuo, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4037343">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Burdens of proof cryptographic culture and evidence law in the age of electronic documents ent://SD_ILS/0/SD_ILS:1082042 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Blanchette, Jean-Fran&ccedil;ois.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339459">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:1020741 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:1027312 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Surveillance or security? the risks posed by new wiretapping technologies ent://SD_ILS/0/SD_ILS:1082153 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Landau, Susan Eva.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339582">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Privacy on the line the politics of wiretapping and encryption ent://SD_ILS/0/SD_ILS:1081319 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Diffie, Whitfield.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338688">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:936705 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:931018 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Guide to pairing-based cryptography ent://SD_ILS/0/SD_ILS:1140799 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Video encryption technology and application ent://SD_ILS/0/SD_ILS:1060089 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Xu, Zhengquan, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3020071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Quantum cryptography and computing theory and implementation ent://SD_ILS/0/SD_ILS:1057662 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Modelling cyber security approaches, methodology, strategies ent://SD_ILS/0/SD_ILS:962577 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSH strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:929721 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ExamWise for CIW security professional exam 1D0-470 ent://SD_ILS/0/SD_ILS:1091942 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:480290 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:481715 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Zhu, Liehuang. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3235-6">http://dx.doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1193238 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format:&#160;Elektronik Kaynak<br/> Data hiding fundamentals and applications : content security in digital media ent://SD_ILS/0/SD_ILS:1186732 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Sencar, Husrev T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120471447">http://www.sciencedirect.com/science/book/9780120471447</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware Protection through Obfuscation ent://SD_ILS/0/SD_ILS:480828 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Forte, Domenic. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49019-9">http://dx.doi.org/10.1007/978-3-319-49019-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber Mag ent://SD_ILS/0/SD_ILS:663894 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z Format:&#160;Devam Eden S&uuml;reli Yay&#305;nlar&#160;S&uuml;reli Yay&#305;n<br/> Advances in Network Systems Architectures, Security, and Applications ent://SD_ILS/0/SD_ILS:480535 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Grzenda, Maciej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44354-6">http://dx.doi.org/10.1007/978-3-319-44354-6</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing SQL server 2005. ent://SD_ILS/0/SD_ILS:1186475 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format:&#160;Elektronik Kaynak<br/> Newnes radio and RF engineering pocket book. ent://SD_ILS/0/SD_ILS:1185217 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Winder, Steve.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750656085">https://www.sciencedirect.com/science/book/9780750656085</a><br/>Format:&#160;Elektronik Kaynak<br/> Quantum Circuits for Symmetric Cryptanalysis ent://SD_ILS/0/SD_ILS:680306 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Langenberg, Brandon Wade, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10808241">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10808241</a><br/>Format:&#160;Kitap<br/> Data Deduplication for Data Optimization for Storage and Network Systems ent://SD_ILS/0/SD_ILS:480375 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Kim, Daehee. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42280-0">http://dx.doi.org/10.1007/978-3-319-42280-0</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing Linux ent://SD_ILS/0/SD_ILS:1189106 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Krishnamurthy Madwachar, Mohan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492072">https://www.sciencedirect.com/science/book/9781597492072</a><br/>Format:&#160;Elektronik Kaynak<br/> The History of Steganography and the Threat Posed to the United States and the Rest of the International Community ent://SD_ILS/0/SD_ILS:692995 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Burney, Micaela L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667</a><br/>Format:&#160;Kitap<br/> Private and Trustworthy Computation Using Additive Cryptographic Primitives ent://SD_ILS/0/SD_ILS:678055 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Tsoutsos, Nektarios Georgios, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986</a><br/>Format:&#160;Kitap<br/> Intelligent Techniques in Signal Processing for Multimedia Security ent://SD_ILS/0/SD_ILS:480553 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Dey, Nilanjan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44790-2">http://dx.doi.org/10.1007/978-3-319-44790-2</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Elektronik Kaynak<br/> Disappearing cryptography : information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:1192050 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Elektronik Kaynak<br/> Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security ent://SD_ILS/0/SD_ILS:1187945 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Chandra, Praphul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewalls : jumpstart for network and systems administrators ent://SD_ILS/0/SD_ILS:1188089 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Vacca, John R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format:&#160;Elektronik Kaynak<br/> Network programming in .NET : with C&#9839; and Visual Basic .NET ent://SD_ILS/0/SD_ILS:1188102 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Reid, Fiach.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583156">https://www.sciencedirect.com/science/book/9781555583156</a><br/>Format:&#160;Elektronik Kaynak<br/> Networking explained ent://SD_ILS/0/SD_ILS:1188067 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Gallo, Michael A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582524">http://www.sciencedirect.com/science/book/9781555582524</a><br/>Format:&#160;Elektronik Kaynak<br/> Disappearing cryptography : information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:1188169 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektronik Kaynak<br/> Network processor design : issues and practices ent://SD_ILS/0/SD_ILS:1188477 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Crowley, Patrick, 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608757">http://www.sciencedirect.com/science/book/9781558608757</a><br/>Format:&#160;Elektronik Kaynak<br/> Privacy Infrastructure for Content and Communications ent://SD_ILS/0/SD_ILS:681813 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Edmundson, Anne Marissa, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822620">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822620</a><br/>Format:&#160;Kitap<br/> Embedded Sensor Systems ent://SD_ILS/0/SD_ILS:481698 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Agrawal, Dharma Prakash. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3038-3">http://dx.doi.org/10.1007/978-981-10-3038-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1192594 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Elektronik Kaynak<br/> Residue Number System Based Fault Tolerant Scheme for Enhancing Rivest Shamir Adleman Encryption Scheme ent://SD_ILS/0/SD_ILS:694772 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Salifu, Abdul-Mumin, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828686">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828686</a><br/>Format:&#160;Kitap<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:1189704 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Elektronik Kaynak<br/> Recent advances in multidisciplinary applied physics : proceedings of the First International Meeting on Applied Physics (APHYS 2003) October 13-18th, 2003, Badajoz, Spain ent://SD_ILS/0/SD_ILS:1185626 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;International Meeting on Applied Physics (1st : 2003 : Badajoz, Spain)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780080446486">http://www.sciencedirect.com/science/book/9780080446486</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code : ASP.NET web application security ent://SD_ILS/0/SD_ILS:1188406 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Burnett, Mark (Mark M.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format:&#160;Elektronik Kaynak<br/> Encyclopedia of information systems ent://SD_ILS/0/SD_ILS:1188888 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Bidgoli, Hossein.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/referenceworks/9780122272400">http://www.sciencedirect.com/science/referenceworks/9780122272400</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the First International Conference on Computational Intelligence and Informatics ICCII 2016 ent://SD_ILS/0/SD_ILS:481646 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2471-9">http://dx.doi.org/10.1007/978-981-10-2471-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of International Conference on Communication and Networks ComNet 2016 ent://SD_ILS/0/SD_ILS:481675 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Modi, Nilesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2750-5">http://dx.doi.org/10.1007/978-981-10-2750-5</a><br/>Format:&#160;Elektronik Kaynak<br/> Building the agile enterprise : with SOA, BPM and MBM ent://SD_ILS/0/SD_ILS:1191761 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Cummins, Fred.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744456">https://www.sciencedirect.com/science/book/9780123744456</a><br/>Format:&#160;Elektronik Kaynak<br/> The Energy Internet : An Open Energy Platform to Transform Legacy Power Systems into Open Innovation and Global Economic Engines. ent://SD_ILS/0/SD_ILS:1152708 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Su, Wencong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5568986">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Joe Celko's thinking in sets : auxiliary, temporal, and virtual tables in SQL ent://SD_ILS/0/SD_ILS:1189099 2025-12-30T14:55:15Z 2025-12-30T14:55:15Z by&#160;Celko, Joe.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123741370">http://www.sciencedirect.com/science/book/9780123741370</a><br/>Format:&#160;Elektronik Kaynak<br/>