Search Results for - Narrowed by: Computer security. - Data encryption (Computer science) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ps$003d300? 2024-06-15T12:38:29Z The unbreakable one-time pad cipher. ent://SD_ILS/0/SD_ILS:2333562 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Rubin, Frank (Cryptographer), presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202291/?ar">https://learning.oreilly.com/videos/~/10000MNHV202291/?ar</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202291">https://learning.oreilly.com/videos/~/10000MNHV202291</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar</a><br/>Format:&#160;Video recording<br/> Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 ent://SD_ILS/0/SD_ILS:2332617 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with z/OS Data Set Encryption ent://SD_ILS/0/SD_ILS:2331252 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a> <a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Linux on Z Encryption for data at-rest ent://SD_ILS/0/SD_ILS:2321973 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cryptography with Java ent://SD_ILS/0/SD_ILS:2319124 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Apache Kafka series : Kafka security (SSL SASL Kerberos ACL) ent://SD_ILS/0/SD_ILS:2316736 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Maarek, St&eacute;phane, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar">https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781789342420/?ar">https://learning.oreilly.com/videos/~/9781789342420/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cracking codes with Python : an introduction to building and breaking ciphers ent://SD_ILS/0/SD_ILS:2314359 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Sweigart, Al, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067498">https://learning.oreilly.com/library/view/~/9781492067498</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067498/?ar">https://learning.oreilly.com/library/view/~/9781492067498/?ar</a><br/>Format:&#160;Electronic Resources<br/> Serious cryptography : a practical introduction to modern encryption ent://SD_ILS/0/SD_ILS:2316208 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting started with z/OS data set encryption ent://SD_ILS/0/SD_ILS:2316937 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2314416 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format:&#160;Electronic Resources<br/> Encryption : toward secure systems ent://SD_ILS/0/SD_ILS:2310827 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Sletten, Brian, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491944363/?ar">https://go.oreilly.com/library-access/library/view/-/9781491944363/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491944363/?ar">https://learning.oreilly.com/videos/~/9781491944363/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:2098152 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:2213541 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Crafting the InfoSec playbook ent://SD_ILS/0/SD_ILS:2307392 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a> <a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format:&#160;Electronic Resources<br/> Application security in the ISO 27001:2013 environment ent://SD_ILS/0/SD_ILS:2309073 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:2308753 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security ent://SD_ILS/0/SD_ILS:2306964 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Arthur, Will, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265849/?ar">https://learning.oreilly.com/library/view/~/9781430265849/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar</a><br/>Format:&#160;Electronic Resources<br/> The InfoSec handbook : an introduction to information security ent://SD_ILS/0/SD_ILS:2304393 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Rao, Umesh Hodeghatta, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263838">https://learning.oreilly.com/library/view/~/9781430263838</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430263838/?ar">https://learning.oreilly.com/library/view/~/9781430263838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:2304275 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format:&#160;Electronic Resources<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:2302623 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format:&#160;Electronic Resources<br/> Salt at scale : lessons from LinkedIn ent://SD_ILS/0/SD_ILS:2308216 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Sebenik, Craig, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491920893/?ar">https://learning.oreilly.com/videos/~/9781491920893/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar">https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:2206169 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:2313482 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a> <a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption : a practical guide to secure computing ent://SD_ILS/0/SD_ILS:2300410 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Loshin, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114838">https://learning.oreilly.com/library/view/~/9780124114838</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124114838/?ar">https://learning.oreilly.com/library/view/~/9780124114838/?ar</a><br/>Format:&#160;Electronic Resources<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:2293173 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Paul, Goutam.<br/><a href="https://learning.oreilly.com/library/view/~/9781439831373">https://learning.oreilly.com/library/view/~/9781439831373</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar">https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439831373/?ar">https://learning.oreilly.com/library/view/~/9781439831373/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2295951 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography with Open-Source Software. ent://SD_ILS/0/SD_ILS:2307016 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:2131708 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hashing in computer science : fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:2289360 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar">https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118031834/?ar">https://learning.oreilly.com/library/view/~/9781118031834/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118031834">https://learning.oreilly.com/library/view/~/9781118031834</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:2285986 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modern cryptanalysis : techniques for advanced code breaking ent://SD_ILS/0/SD_ILS:2284627 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format:&#160;Electronic Resources<br/> Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchange ent://SD_ILS/0/SD_ILS:2310770 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format:&#160;Electronic Resources<br/> Encryption facility for z/OS version 1.10 ent://SD_ILS/0/SD_ILS:2335107 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Kappeler, Patrick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738489557/?ar">https://go.oreilly.com/library-access/library/view/-/0738489557/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738489557">https://learning.oreilly.com/library/view/~/0738489557</a> <a href="https://learning.oreilly.com/library/view/~/0738489557/?ar">https://learning.oreilly.com/library/view/~/0738489557/?ar</a><br/>Format:&#160;Electronic Resources<br/> Writing secure code : practical strategies and proven techniques for building secure applications in a networked world ent://SD_ILS/0/SD_ILS:2281158 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Howard, Michael, 1965- author.<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure XML : the New Syntax for Signatures and Encryption. ent://SD_ILS/0/SD_ILS:2290491 2024-06-15T12:38:29Z 2024-06-15T12:38:29Z by&#160;Niles, Kitty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201756056/?ar">https://go.oreilly.com/library-access/library/view/-/0201756056/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201756056">https://learning.oreilly.com/library/view/~/0201756056</a> <a href="https://learning.oreilly.com/library/view/~/0201756056/?ar">https://learning.oreilly.com/library/view/~/0201756056/?ar</a><br/>Format:&#160;Electronic Resources<br/>