Arama Sonuçları Data encryption (Computer science). - Daraltılmış: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2026-01-14T02:27:11ZSimple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232026-01-14T02:27:11Z2026-01-14T02:27:11Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142026-01-14T02:27:11Z2026-01-14T02:27:11Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Elektronik Kaynak<br/>Yazılım güvenliği saldırı ve savunmaent://SD_ILS/0/SD_ILS:2915692026-01-14T02:27:11Z2026-01-14T02:27:11Zby Demir, Bünyamin<br/>Format: Kitap<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312026-01-14T02:27:11Z2026-01-14T02:27:11Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-01-14T02:27:11Z2026-01-14T02:27:11Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122026-01-14T02:27:11Z2026-01-14T02:27:11Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-01-14T02:27:11Z2026-01-14T02:27:11Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322026-01-14T02:27:11Z2026-01-14T02:27:11Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052026-01-14T02:27:11Z2026-01-14T02:27:11Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-01-14T02:27:11Z2026-01-14T02:27:11Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-01-14T02:27:11Z2026-01-14T02:27:11Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-01-14T02:27:11Z2026-01-14T02:27:11Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Elektronik Kaynak<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-01-14T02:27:11Z2026-01-14T02:27:11Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Elektronik Kaynak<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-01-14T02:27:11Z2026-01-14T02:27:11Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Elektronik Kaynak<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632026-01-14T02:27:11Z2026-01-14T02:27:11Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektronik Kaynak<br/>