Giriş
|
Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
English
Search Limit
Bütün Kütüphaneler
Electronic Resources
All
Başkent University Library
Anadolu OSB Meslek Yüksekokulu
Atasev Özel Koleksiyon
Erdoğan Tercan Collection
Fine Arts And Design Archive
Kazan Meslek Yüksekokulu
Law Collection
Ord.Prof.Dr. Enver Ziya Karal Tarih Uygulama Ars.Mrk.
Özel Koleksiyon Serdar Özersin
Thesis Collection
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
16
Search Field
Tüm Alanlar
Arama:
Gelişmiş Arama
Search Results
Electronic Resources
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Computer security.
+
Konu: Cryptography.
Yazar
Dahil
Hariç
ProQuest (Firm)
(8)
International Business Machines Corporation. International Technical Support Organization.
(3)
Rayns, Chris.
(2)
Bergstra, J. A.
(1)
Fionov, Andrey.
(1)
Galbreath, Nick
(1)
Heiderich, Mario.
(1)
Huang, Hsiang-Cheh.
(1)
Hänninen, Pekka.
(1)
Jain, L. C.
(1)
Kappeler, Patrick.
(1)
Konheim, Alan G., 1934-
(1)
Leeuw, Karl de.
(1)
Oppliger, Rolf.
(1)
Pan, Jeng-Shyang.
(1)
Ryabko, Boris.
(1)
ScienceDirect (Online service)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Kitap
Dil
Dahil
Hariç
English
(10)
Yayın Yılı
Dahil
Hariç
-
2004
(3)
2003
(2)
2005
(2)
2002
(1)
2007
(1)
2010
(1)
2011
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Konu
Dahil
Hariç
Electronic books.
(10)
Data encryption (Computer science)
(2)
Internet -- Security measures.
(2)
Application software -- Development.
(1)
BUSINESS & ECONOMICS -- Business Writing.
(1)
Bilgisayar güvenliği.
(1)
Computer networks -- Security measures.
(1)
Computer security -- History.
(1)
Copyright -- History.
(1)
Copyright.
(1)
Cryptography -- History.
(1)
Data protection.
(1)
Database security.
(1)
Databescherming.
(1)
Digital watermarking.
(1)
Embedded computer systems.
(1)
Hashing (Computer science)
(1)
History.
(1)
IBM computers.
(1)
Internet programming.
(1)
Java (bilgisayar program dili).
(1)
Java (computer program language).
(1)
Kriptografi.
(1)
Technology -- Research -- United States.
(1)
Watermarks -- Data processing.
(1)
Web site development.
(1)
z/OS.
(1)
İnternet -- Emniyet ölçümleri.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Kütüphane
Dahil
Hariç
Başkent Kütüphanesi
Lokasyon
Dahil
Hariç
E-Kütüphane
Ebook Central
Elsevier E-Kitap Koleksiyonu
Merkez Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
11 sonuç bulundu
1
Sırala:
Konuyla İlgili Sırala
Yayın Yılı (eskiden yeniye)
Yayın Yılı (yeniden eskiye)
Başlık
Yazar
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
00000000000
DEFAULTTR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-
1.
Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-
by
Heiderich, Mario.
ScienceDirect
An electronic book accessible through the World Wide Web; click for information
Format:
Hashing in computer science fifty years of slicing and dicing
2.
Hashing in computer science fifty years of slicing and dicing
by
Konheim, Alan G., 1934-
Click to View
Format:
The history of information security : a comprehensive handbook
3.
The history of information security : a comprehensive handbook
by
Leeuw, Karl de.
ScienceDirect
http://www.sciencedirect.com/science/book/9780444516084
Format:
Basics of contemporary cryptography for IT practitioners
4.
Basics of contemporary cryptography for IT practitioners
by
Ryabko, Boris.
Click to View
Format:
Contemporary cryptography
5.
Contemporary cryptography
by
Oppliger, Rolf.
Click to View
Format:
Intelligent watermarking techniques
6.
Intelligent watermarking techniques
by
Pan, Jeng-Shyang.
Click to View
Format:
zSeries Trusted Key Entry (TKE) version 4.2 update
7.
zSeries Trusted Key Entry (TKE) version 4.2 update
by
Kappeler, Patrick.
Click to View
Format:
IBM eserver zSeries 990 (z990) cryptography implementation
8.
IBM eserver zSeries 990 (z990) cryptography implementation
by
Rayns, Chris.
Click to View
Format:
zSeries crypto guide update
9.
zSeries crypto guide update
by
Rayns, Chris.
Click to View
Format:
Security secrets, intruders and ID tags.
10.
Security secrets, intruders and ID tags.
by
ProQuest (Firm)
Click to View
Format:
Cryptography for internet and database applications : developing secret and public key techniques with Java
11.
Cryptography for internet and database applications : developing secret and public key techniques with Java
by
Galbreath, Nick
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
Search Results
Electronic Resources
Search Results
Electronic Resources
OK
Eposta Adresleri
:
Phone Number:
Mobile Carrier:
AT&T
Boost
Nextel (Sprint)
Sprint (PCS)
T Mobile
TracFone
US Cellular
Verizon
Virgin
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.
Text it to me
Text it to me, and go to next item
Electronic Resources
Sonuçlar alınıyor Electronic Resources...
action