Arama Sonuçları Data Encryption.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bEncryption.$0026ic$003dtrue$0026ps$003d300?dt=list2026-01-05T07:05:18ZSimple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232026-01-05T07:05:18Z2026-01-05T07:05:18Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11249502026-01-05T07:05:18Z2026-01-05T07:05:18Zby Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information hidingent://SD_ILS/0/SD_ILS:11243132026-01-05T07:05:18Z2026-01-05T07:05:18Zby Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821270">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142026-01-05T07:05:18Z2026-01-05T07:05:18Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography protocols, design and applicationsent://SD_ILS/0/SD_ILS:10607492026-01-05T07:05:18Z2026-01-05T07:05:18Zby Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity-based cryptographyent://SD_ILS/0/SD_ILS:9530802026-01-05T07:05:18Z2026-01-05T07:05:18Zby Joye, Marc, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433453">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to identity-based encryptionent://SD_ILS/0/SD_ILS:9452512026-01-05T07:05:18Z2026-01-05T07:05:18Zby Martin, Luther.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338784">Click to View</a><br/>Format: Elektronik Kaynak<br/>Quantum cryptography potentially perfect security.ent://SD_ILS/0/SD_ILS:10920202026-01-05T07:05:18Z2026-01-05T07:05:18Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format: Elektronik Kaynak<br/>Color image watermarking : algorithms and technologiesent://SD_ILS/0/SD_ILS:11225632026-01-05T07:05:18Z2026-01-05T07:05:18Zby Su, Qingtang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4790352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyondent://SD_ILS/0/SD_ILS:10429932026-01-05T07:05:18Z2026-01-05T07:05:18Zby Salam, Abdul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895695">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography cracking codesent://SD_ILS/0/SD_ILS:10153082026-01-05T07:05:18Z2026-01-05T07:05:18Zby Curley, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220658">Click to View</a><br/>Format: Elektronik Kaynak<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:10118942026-01-05T07:05:18Z2026-01-05T07:05:18Zby Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format: Elektronik Kaynak<br/>Yazılım güvenliği saldırı ve savunmaent://SD_ILS/0/SD_ILS:2915692026-01-05T07:05:18Z2026-01-05T07:05:18Zby Demir, Bünyamin<br/>Format: Kitap<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462026-01-05T07:05:18Z2026-01-05T07:05:18Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Elektronik Kaynak<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312026-01-05T07:05:18Z2026-01-05T07:05:18Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Elektronik Kaynak<br/>Machine learning in image steganalysisent://SD_ILS/0/SD_ILS:10010092026-01-05T07:05:18Z2026-01-05T07:05:18Zby Schaathun, Hans Georg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1022347">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-01-05T07:05:18Z2026-01-05T07:05:18Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security of block ciphers : from algorithm design to hardware implementationent://SD_ILS/0/SD_ILS:11030072026-01-05T07:05:18Z2026-01-05T07:05:18Zby Sakiyama, Kazuo, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4037343">Click to View</a><br/>Format: Elektronik Kaynak<br/>Burdens of proof cryptographic culture and evidence law in the age of electronic documentsent://SD_ILS/0/SD_ILS:10820422026-01-05T07:05:18Z2026-01-05T07:05:18Zby Blanchette, Jean-François.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339459">Click to View</a><br/>Format: Elektronik Kaynak<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:10207412026-01-05T07:05:18Z2026-01-05T07:05:18Zby Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122026-01-05T07:05:18Z2026-01-05T07:05:18Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Elektronik Kaynak<br/>Surveillance or security? the risks posed by new wiretapping technologiesent://SD_ILS/0/SD_ILS:10821532026-01-05T07:05:18Z2026-01-05T07:05:18Zby Landau, Susan Eva.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339582">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-01-05T07:05:18Z2026-01-05T07:05:18Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322026-01-05T07:05:18Z2026-01-05T07:05:18Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Privacy on the line the politics of wiretapping and encryptionent://SD_ILS/0/SD_ILS:10813192026-01-05T07:05:18Z2026-01-05T07:05:18Zby Diffie, Whitfield.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338688">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052026-01-05T07:05:18Z2026-01-05T07:05:18Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182026-01-05T07:05:18Z2026-01-05T07:05:18Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-01-05T07:05:18Z2026-01-05T07:05:18Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Guide to pairing-based cryptographyent://SD_ILS/0/SD_ILS:11407992026-01-05T07:05:18Z2026-01-05T07:05:18Zby El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format: Elektronik Kaynak<br/>Quantum cryptography and computing theory and implementationent://SD_ILS/0/SD_ILS:10576622026-01-05T07:05:18Z2026-01-05T07:05:18Zby Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format: Elektronik Kaynak<br/>Video encryption technology and applicationent://SD_ILS/0/SD_ILS:10600892026-01-05T07:05:18Z2026-01-05T07:05:18Zby Xu, Zhengquan, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3020071">Click to View</a><br/>Format: Elektronik Kaynak<br/>Modelling cyber security approaches, methodology, strategiesent://SD_ILS/0/SD_ILS:9625772026-01-05T07:05:18Z2026-01-05T07:05:18Zby NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-01-05T07:05:18Z2026-01-05T07:05:18Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSH strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:9297212026-01-05T07:05:18Z2026-01-05T07:05:18Zby Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format: Elektronik Kaynak<br/>ExamWise for CIW security professional exam 1D0-470ent://SD_ILS/0/SD_ILS:10919422026-01-05T07:05:18Z2026-01-05T07:05:18Zby Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format: Elektronik Kaynak<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-01-05T07:05:18Z2026-01-05T07:05:18Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Elektronik Kaynak<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-01-05T07:05:18Z2026-01-05T07:05:18Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Elektronik Kaynak<br/>Secure and Privacy-Preserving Data Communication in Internet of Thingsent://SD_ILS/0/SD_ILS:4817152026-01-05T07:05:18Z2026-01-05T07:05:18Zby Zhu, Liehuang. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3235-6">http://dx.doi.org/10.1007/978-981-10-3235-6</a><br/>Format: Elektronik Kaynak<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11932382026-01-05T07:05:18Z2026-01-05T07:05:18Zby Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Elektronik Kaynak<br/>Data hiding fundamentals and applications : content security in digital mediaent://SD_ILS/0/SD_ILS:11867322026-01-05T07:05:18Z2026-01-05T07:05:18Zby Sencar, Husrev T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120471447">http://www.sciencedirect.com/science/book/9780120471447</a><br/>Format: Elektronik Kaynak<br/>Hardware Protection through Obfuscationent://SD_ILS/0/SD_ILS:4808282026-01-05T07:05:18Z2026-01-05T07:05:18Zby Forte, Domenic. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49019-9">http://dx.doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Elektronik Kaynak<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-01-05T07:05:18Z2026-01-05T07:05:18Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Elektronik Kaynak<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632026-01-05T07:05:18Z2026-01-05T07:05:18Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektronik Kaynak<br/>Cyber Magent://SD_ILS/0/SD_ILS:6638942026-01-05T07:05:18Z2026-01-05T07:05:18ZFormat: Devam Eden Süreli Yayınlar Süreli Yayın<br/>Advances in Network Systems Architectures, Security, and Applicationsent://SD_ILS/0/SD_ILS:4805352026-01-05T07:05:18Z2026-01-05T07:05:18Zby Grzenda, Maciej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44354-6">http://dx.doi.org/10.1007/978-3-319-44354-6</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing SQL server 2005.ent://SD_ILS/0/SD_ILS:11864752026-01-05T07:05:18Z2026-01-05T07:05:18ZScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Elektronik Kaynak<br/>Newnes radio and RF engineering pocket book.ent://SD_ILS/0/SD_ILS:11852172026-01-05T07:05:18Z2026-01-05T07:05:18Zby Winder, Steve.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750656085">https://www.sciencedirect.com/science/book/9780750656085</a><br/>Format: Elektronik Kaynak<br/>Quantum Circuits for Symmetric Cryptanalysisent://SD_ILS/0/SD_ILS:6803062026-01-05T07:05:18Z2026-01-05T07:05:18Zby Langenberg, Brandon Wade, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10808241">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10808241</a><br/>Format: Kitap<br/>Data Deduplication for Data Optimization for Storage and Network Systemsent://SD_ILS/0/SD_ILS:4803752026-01-05T07:05:18Z2026-01-05T07:05:18Zby Kim, Daehee. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42280-0">http://dx.doi.org/10.1007/978-3-319-42280-0</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:11891062026-01-05T07:05:18Z2026-01-05T07:05:18Zby Krishnamurthy Madwachar, Mohan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492072">https://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Elektronik Kaynak<br/>The History of Steganography and the Threat Posed to the United States and the Rest of the International Communityent://SD_ILS/0/SD_ILS:6929952026-01-05T07:05:18Z2026-01-05T07:05:18Zby Burney, Micaela L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667</a><br/>Format: Kitap<br/>Private and Trustworthy Computation Using Additive Cryptographic Primitivesent://SD_ILS/0/SD_ILS:6780552026-01-05T07:05:18Z2026-01-05T07:05:18Zby Tsoutsos, Nektarios Georgios, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986</a><br/>Format: Kitap<br/>Intelligent Techniques in Signal Processing for Multimedia Securityent://SD_ILS/0/SD_ILS:4805532026-01-05T07:05:18Z2026-01-05T07:05:18Zby Dey, Nilanjan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44790-2">http://dx.doi.org/10.1007/978-3-319-44790-2</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-01-05T07:05:18Z2026-01-05T07:05:18Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Elektronik Kaynak<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:4817142026-01-05T07:05:18Z2026-01-05T07:05:18Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Elektronik Kaynak<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11920502026-01-05T07:05:18Z2026-01-05T07:05:18Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Elektronik Kaynak<br/>Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc securityent://SD_ILS/0/SD_ILS:11879452026-01-05T07:05:18Z2026-01-05T07:05:18Zby Chandra, Praphul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format: Elektronik Kaynak<br/>Firewalls : jumpstart for network and systems administratorsent://SD_ILS/0/SD_ILS:11880892026-01-05T07:05:18Z2026-01-05T07:05:18Zby Vacca, John R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format: Elektronik Kaynak<br/>Network programming in .NET : with C♯ and Visual Basic .NETent://SD_ILS/0/SD_ILS:11881022026-01-05T07:05:18Z2026-01-05T07:05:18Zby Reid, Fiach.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583156">https://www.sciencedirect.com/science/book/9781555583156</a><br/>Format: Elektronik Kaynak<br/>Networking explainedent://SD_ILS/0/SD_ILS:11880672026-01-05T07:05:18Z2026-01-05T07:05:18Zby Gallo, Michael A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582524">http://www.sciencedirect.com/science/book/9781555582524</a><br/>Format: Elektronik Kaynak<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11881692026-01-05T07:05:18Z2026-01-05T07:05:18Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Elektronik Kaynak<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-01-05T07:05:18Z2026-01-05T07:05:18Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektronik Kaynak<br/>Network processor design : issues and practicesent://SD_ILS/0/SD_ILS:11884772026-01-05T07:05:18Z2026-01-05T07:05:18Zby Crowley, Patrick, 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608757">http://www.sciencedirect.com/science/book/9781558608757</a><br/>Format: Elektronik Kaynak<br/>Privacy Infrastructure for Content and Communicationsent://SD_ILS/0/SD_ILS:6818132026-01-05T07:05:18Z2026-01-05T07:05:18Zby Edmundson, Anne Marissa, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822620">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822620</a><br/>Format: Kitap<br/>Embedded Sensor Systemsent://SD_ILS/0/SD_ILS:4816982026-01-05T07:05:18Z2026-01-05T07:05:18Zby Agrawal, Dharma Prakash. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3038-3">http://dx.doi.org/10.1007/978-981-10-3038-3</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11925942026-01-05T07:05:18Z2026-01-05T07:05:18Zby Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektronik Kaynak<br/>Residue Number System Based Fault Tolerant Scheme for Enhancing Rivest Shamir Adleman Encryption Schemeent://SD_ILS/0/SD_ILS:6947722026-01-05T07:05:18Z2026-01-05T07:05:18Zby Salifu, Abdul-Mumin, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828686">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828686</a><br/>Format: Kitap<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:11897042026-01-05T07:05:18Z2026-01-05T07:05:18Zby Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Elektronik Kaynak<br/>Recent advances in multidisciplinary applied physics : proceedings of the First International Meeting on Applied Physics (APHYS 2003) October 13-18th, 2003, Badajoz, Spainent://SD_ILS/0/SD_ILS:11856262026-01-05T07:05:18Z2026-01-05T07:05:18Zby International Meeting on Applied Physics (1st : 2003 : Badajoz, Spain)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780080446486">http://www.sciencedirect.com/science/book/9780080446486</a><br/>Format: Elektronik Kaynak<br/>Hacking the code : ASP.NET web application securityent://SD_ILS/0/SD_ILS:11884062026-01-05T07:05:18Z2026-01-05T07:05:18Zby Burnett, Mark (Mark M.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Elektronik Kaynak<br/>Encyclopedia of information systemsent://SD_ILS/0/SD_ILS:11888882026-01-05T07:05:18Z2026-01-05T07:05:18Zby Bidgoli, Hossein.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/referenceworks/9780122272400">http://www.sciencedirect.com/science/referenceworks/9780122272400</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-01-05T07:05:18Z2026-01-05T07:05:18Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the First International Conference on Computational Intelligence and Informatics ICCII 2016ent://SD_ILS/0/SD_ILS:4816462026-01-05T07:05:18Z2026-01-05T07:05:18Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2471-9">http://dx.doi.org/10.1007/978-981-10-2471-9</a><br/>Format: Elektronik Kaynak<br/>Proceedings of International Conference on Communication and Networks ComNet 2016ent://SD_ILS/0/SD_ILS:4816752026-01-05T07:05:18Z2026-01-05T07:05:18Zby Modi, Nilesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2750-5">http://dx.doi.org/10.1007/978-981-10-2750-5</a><br/>Format: Elektronik Kaynak<br/>Building the agile enterprise : with SOA, BPM and MBMent://SD_ILS/0/SD_ILS:11917612026-01-05T07:05:18Z2026-01-05T07:05:18Zby Cummins, Fred.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744456">https://www.sciencedirect.com/science/book/9780123744456</a><br/>Format: Elektronik Kaynak<br/>The Energy Internet : An Open Energy Platform to Transform Legacy Power Systems into Open Innovation and Global Economic Engines.ent://SD_ILS/0/SD_ILS:11527082026-01-05T07:05:18Z2026-01-05T07:05:18Zby Su, Wencong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5568986">Click to View</a><br/>Format: Elektronik Kaynak<br/>Joe Celko's thinking in sets : auxiliary, temporal, and virtual tables in SQLent://SD_ILS/0/SD_ILS:11890992026-01-05T07:05:18Z2026-01-05T07:05:18Zby Celko, Joe.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123741370">http://www.sciencedirect.com/science/book/9780123741370</a><br/>Format: Elektronik Kaynak<br/>