Arama Sonuçları Data encryption (Computer science).SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026ps$003d300?dt=list2026-01-01T15:46:43ZCryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11249502026-01-01T15:46:43Z2026-01-01T15:46:43Zby Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format: Elektronik Kaynak<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232026-01-01T15:46:43Z2026-01-01T15:46:43Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information hidingent://SD_ILS/0/SD_ILS:11243132026-01-01T15:46:43Z2026-01-01T15:46:43Zby Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821270">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142026-01-01T15:46:43Z2026-01-01T15:46:43Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography protocols, design and applicationsent://SD_ILS/0/SD_ILS:10607492026-01-01T15:46:43Z2026-01-01T15:46:43Zby Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity-based cryptographyent://SD_ILS/0/SD_ILS:9530802026-01-01T15:46:43Z2026-01-01T15:46:43Zby Joye, Marc, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433453">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to identity-based encryptionent://SD_ILS/0/SD_ILS:9452512026-01-01T15:46:43Z2026-01-01T15:46:43Zby Martin, Luther.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338784">Click to View</a><br/>Format: Elektronik Kaynak<br/>Quantum cryptography potentially perfect security.ent://SD_ILS/0/SD_ILS:10920202026-01-01T15:46:43Z2026-01-01T15:46:43Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format: Elektronik Kaynak<br/>Color image watermarking : algorithms and technologiesent://SD_ILS/0/SD_ILS:11225632026-01-01T15:46:43Z2026-01-01T15:46:43Zby Su, Qingtang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4790352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyondent://SD_ILS/0/SD_ILS:10429932026-01-01T15:46:43Z2026-01-01T15:46:43Zby Salam, Abdul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895695">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography cracking codesent://SD_ILS/0/SD_ILS:10153082026-01-01T15:46:43Z2026-01-01T15:46:43Zby Curley, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220658">Click to View</a><br/>Format: Elektronik Kaynak<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:10118942026-01-01T15:46:43Z2026-01-01T15:46:43Zby Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format: Elektronik Kaynak<br/>Yazılım güvenliği saldırı ve savunmaent://SD_ILS/0/SD_ILS:2915692026-01-01T15:46:43Z2026-01-01T15:46:43Zby Demir, Bünyamin<br/>Format: Kitap<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462026-01-01T15:46:43Z2026-01-01T15:46:43Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Elektronik Kaynak<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312026-01-01T15:46:43Z2026-01-01T15:46:43Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Elektronik Kaynak<br/>Machine learning in image steganalysisent://SD_ILS/0/SD_ILS:10010092026-01-01T15:46:43Z2026-01-01T15:46:43Zby Schaathun, Hans Georg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1022347">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security of block ciphers : from algorithm design to hardware implementationent://SD_ILS/0/SD_ILS:11030072026-01-01T15:46:43Z2026-01-01T15:46:43Zby Sakiyama, Kazuo, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4037343">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-01-01T15:46:43Z2026-01-01T15:46:43Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>Burdens of proof cryptographic culture and evidence law in the age of electronic documentsent://SD_ILS/0/SD_ILS:10820422026-01-01T15:46:43Z2026-01-01T15:46:43Zby Blanchette, Jean-François.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339459">Click to View</a><br/>Format: Elektronik Kaynak<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:10207412026-01-01T15:46:43Z2026-01-01T15:46:43Zby Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122026-01-01T15:46:43Z2026-01-01T15:46:43Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Elektronik Kaynak<br/>Surveillance or security? the risks posed by new wiretapping technologiesent://SD_ILS/0/SD_ILS:10821532026-01-01T15:46:43Z2026-01-01T15:46:43Zby Landau, Susan Eva.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339582">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-01-01T15:46:43Z2026-01-01T15:46:43Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322026-01-01T15:46:43Z2026-01-01T15:46:43Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Privacy on the line the politics of wiretapping and encryptionent://SD_ILS/0/SD_ILS:10813192026-01-01T15:46:43Z2026-01-01T15:46:43Zby Diffie, Whitfield.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338688">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052026-01-01T15:46:43Z2026-01-01T15:46:43Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182026-01-01T15:46:43Z2026-01-01T15:46:43Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-01-01T15:46:43Z2026-01-01T15:46:43Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Guide to pairing-based cryptographyent://SD_ILS/0/SD_ILS:11407992026-01-01T15:46:43Z2026-01-01T15:46:43Zby El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format: Elektronik Kaynak<br/>Quantum cryptography and computing theory and implementationent://SD_ILS/0/SD_ILS:10576622026-01-01T15:46:43Z2026-01-01T15:46:43Zby Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format: Elektronik Kaynak<br/>Video encryption technology and applicationent://SD_ILS/0/SD_ILS:10600892026-01-01T15:46:43Z2026-01-01T15:46:43Zby Xu, Zhengquan, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3020071">Click to View</a><br/>Format: Elektronik Kaynak<br/>Modelling cyber security approaches, methodology, strategiesent://SD_ILS/0/SD_ILS:9625772026-01-01T15:46:43Z2026-01-01T15:46:43Zby NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-01-01T15:46:43Z2026-01-01T15:46:43Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSH strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:9297212026-01-01T15:46:43Z2026-01-01T15:46:43Zby Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format: Elektronik Kaynak<br/>ExamWise for CIW security professional exam 1D0-470ent://SD_ILS/0/SD_ILS:10919422026-01-01T15:46:43Z2026-01-01T15:46:43Zby Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-01-01T15:46:43Z2026-01-01T15:46:43Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Elektronik Kaynak<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-01-01T15:46:43Z2026-01-01T15:46:43Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Elektronik Kaynak<br/>Secure and Privacy-Preserving Data Communication in Internet of Thingsent://SD_ILS/0/SD_ILS:4817152026-01-01T15:46:43Z2026-01-01T15:46:43Zby Zhu, Liehuang. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3235-6">http://dx.doi.org/10.1007/978-981-10-3235-6</a><br/>Format: Elektronik Kaynak<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11932382026-01-01T15:46:43Z2026-01-01T15:46:43Zby Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Elektronik Kaynak<br/>Data hiding fundamentals and applications : content security in digital mediaent://SD_ILS/0/SD_ILS:11867322026-01-01T15:46:43Z2026-01-01T15:46:43Zby Sencar, Husrev T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120471447">http://www.sciencedirect.com/science/book/9780120471447</a><br/>Format: Elektronik Kaynak<br/>Hardware Protection through Obfuscationent://SD_ILS/0/SD_ILS:4808282026-01-01T15:46:43Z2026-01-01T15:46:43Zby Forte, Domenic. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49019-9">http://dx.doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Elektronik Kaynak<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-01-01T15:46:43Z2026-01-01T15:46:43Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Elektronik Kaynak<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632026-01-01T15:46:43Z2026-01-01T15:46:43Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektronik Kaynak<br/>