Search Results for - Narrowed by: English - Data encryption (Computer science) - Sécurité informatique.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?2024-06-21T22:21:56ZCryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10ent://SD_ILS/0/SD_ILS:23326172024-06-21T22:21:56Z2024-06-21T22:21:56Zby Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format: Electronic Resources<br/>Getting Started with z/OS Data Set Encryptionent://SD_ILS/0/SD_ILS:23312522024-06-21T22:21:56Z2024-06-21T22:21:56Zby White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>Getting started with Linux on Z Encryption for data at-restent://SD_ILS/0/SD_ILS:23219732024-06-21T22:21:56Z2024-06-21T22:21:56Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cryptography with Javaent://SD_ILS/0/SD_ILS:23191242024-06-21T22:21:56Z2024-06-21T22:21:56Zby Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format: Electronic Resources<br/>Cracking codes with Python : an introduction to building and breaking ciphersent://SD_ILS/0/SD_ILS:23143592024-06-21T22:21:56Z2024-06-21T22:21:56Zby Sweigart, Al, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067498">https://learning.oreilly.com/library/view/~/9781492067498</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067498/?ar">https://learning.oreilly.com/library/view/~/9781492067498/?ar</a><br/>Format: Electronic Resources<br/>Apache Kafka series : Kafka security (SSL SASL Kerberos ACL)ent://SD_ILS/0/SD_ILS:23167362024-06-21T22:21:56Z2024-06-21T22:21:56Zby Maarek, Stéphane, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar">https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789342420/?ar">https://learning.oreilly.com/videos/~/9781789342420/?ar</a><br/>Format: Electronic Resources<br/>Getting started with z/OS data set encryptionent://SD_ILS/0/SD_ILS:23169372024-06-21T22:21:56Z2024-06-21T22:21:56Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format: Electronic Resources<br/>Serious cryptography : a practical introduction to modern encryptionent://SD_ILS/0/SD_ILS:23162082024-06-21T22:21:56Z2024-06-21T22:21:56Zby Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:23144162024-06-21T22:21:56Z2024-06-21T22:21:56Zby Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>Encryption : toward secure systemsent://SD_ILS/0/SD_ILS:23108272024-06-21T22:21:56Z2024-06-21T22:21:56Zby Sletten, Brian, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491944363/?ar">https://go.oreilly.com/library-access/library/view/-/9781491944363/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491944363/?ar">https://learning.oreilly.com/videos/~/9781491944363/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of securityent://SD_ILS/0/SD_ILS:23069642024-06-21T22:21:56Z2024-06-21T22:21:56Zby Arthur, Will, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265849/?ar">https://learning.oreilly.com/library/view/~/9781430265849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar</a><br/>Format: Electronic Resources<br/>Crafting the InfoSec playbookent://SD_ILS/0/SD_ILS:23073922024-06-21T22:21:56Z2024-06-21T22:21:56Zby Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:23090732024-06-21T22:21:56Z2024-06-21T22:21:56Zby Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format: Electronic Resources<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:23087532024-06-21T22:21:56Z2024-06-21T22:21:56Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format: Electronic Resources<br/>Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:23042752024-06-21T22:21:56Z2024-06-21T22:21:56Zby Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:23026232024-06-21T22:21:56Z2024-06-21T22:21:56Zby Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format: Electronic Resources<br/>Salt at scale : lessons from LinkedInent://SD_ILS/0/SD_ILS:23082162024-06-21T22:21:56Z2024-06-21T22:21:56Zby Sebenik, Craig, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491920893/?ar">https://learning.oreilly.com/videos/~/9781491920893/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar">https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption : a practical guide to secure computingent://SD_ILS/0/SD_ILS:23004102024-06-21T22:21:56Z2024-06-21T22:21:56Zby Loshin, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114838">https://learning.oreilly.com/library/view/~/9780124114838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124114838/?ar">https://learning.oreilly.com/library/view/~/9780124114838/?ar</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-06-21T22:21:56Z2024-06-21T22:21:56Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:22959512024-06-21T22:21:56Z2024-06-21T22:21:56Zby ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:22931732024-06-21T22:21:56Z2024-06-21T22:21:56Zby Paul, Goutam.<br/><a href="https://learning.oreilly.com/library/view/~/9781439831373">https://learning.oreilly.com/library/view/~/9781439831373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar">https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439831373/?ar">https://learning.oreilly.com/library/view/~/9781439831373/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography with Open-Source Software.ent://SD_ILS/0/SD_ILS:23070162024-06-21T22:21:56Z2024-06-21T22:21:56Zby McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format: Electronic Resources<br/>Hashing in computer science : fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:22893602024-06-21T22:21:56Z2024-06-21T22:21:56Zby Konheim, Alan G., 1934-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar">https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834/?ar">https://learning.oreilly.com/library/view/~/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834">https://learning.oreilly.com/library/view/~/9781118031834</a><br/>Format: Electronic Resources<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:22859862024-06-21T22:21:56Z2024-06-21T22:21:56Zby Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>Modern cryptanalysis : techniques for advanced code breakingent://SD_ILS/0/SD_ILS:22846272024-06-21T22:21:56Z2024-06-21T22:21:56Zby Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format: Electronic Resources<br/>Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchangeent://SD_ILS/0/SD_ILS:23107702024-06-21T22:21:56Z2024-06-21T22:21:56Zby Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format: Electronic Resources<br/>Encryption facility for z/OS version 1.10ent://SD_ILS/0/SD_ILS:23351072024-06-21T22:21:56Z2024-06-21T22:21:56Zby Kappeler, Patrick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738489557/?ar">https://go.oreilly.com/library-access/library/view/-/0738489557/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557">https://learning.oreilly.com/library/view/~/0738489557</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557/?ar">https://learning.oreilly.com/library/view/~/0738489557/?ar</a><br/>Format: Electronic Resources<br/>Writing secure code : practical strategies and proven techniques for building secure applications in a networked worldent://SD_ILS/0/SD_ILS:22811582024-06-21T22:21:56Z2024-06-21T22:21:56Zby Howard, Michael, 1965- author.<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format: Electronic Resources<br/>Secure XML : the New Syntax for Signatures and Encryption.ent://SD_ILS/0/SD_ILS:22904912024-06-21T22:21:56Z2024-06-21T22:21:56Zby Niles, Kitty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201756056/?ar">https://go.oreilly.com/library-access/library/view/-/0201756056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056">https://learning.oreilly.com/library/view/~/0201756056</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056/?ar">https://learning.oreilly.com/library/view/~/0201756056/?ar</a><br/>Format: Electronic Resources<br/>