Search Results for - Narrowed by: Computer security. - Data encryption (Computer science)SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ps$003d300?2024-06-15T12:38:29ZThe unbreakable one-time pad cipher.ent://SD_ILS/0/SD_ILS:23335622024-06-15T12:38:29Z2024-06-15T12:38:29Zby Rubin, Frank (Cryptographer), presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202291/?ar">https://learning.oreilly.com/videos/~/10000MNHV202291/?ar</a>
<a href="https://learning.oreilly.com/videos/~/10000MNHV202291">https://learning.oreilly.com/videos/~/10000MNHV202291</a>
<a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202291/?ar</a><br/>Format: Video recording<br/>Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10ent://SD_ILS/0/SD_ILS:23326172024-06-15T12:38:29Z2024-06-15T12:38:29Zby Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format: Electronic Resources<br/>Getting Started with z/OS Data Set Encryptionent://SD_ILS/0/SD_ILS:23312522024-06-15T12:38:29Z2024-06-15T12:38:29Zby White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>Getting started with Linux on Z Encryption for data at-restent://SD_ILS/0/SD_ILS:23219732024-06-15T12:38:29Z2024-06-15T12:38:29Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format: Electronic Resources<br/>Hands-on cryptography with Javaent://SD_ILS/0/SD_ILS:23191242024-06-15T12:38:29Z2024-06-15T12:38:29Zby Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format: Electronic Resources<br/>Apache Kafka series : Kafka security (SSL SASL Kerberos ACL)ent://SD_ILS/0/SD_ILS:23167362024-06-15T12:38:29Z2024-06-15T12:38:29Zby Maarek, Stéphane, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar">https://go.oreilly.com/library-access/library/view/-/9781789342420/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781789342420/?ar">https://learning.oreilly.com/videos/~/9781789342420/?ar</a><br/>Format: Electronic Resources<br/>Cracking codes with Python : an introduction to building and breaking ciphersent://SD_ILS/0/SD_ILS:23143592024-06-15T12:38:29Z2024-06-15T12:38:29Zby Sweigart, Al, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067498">https://learning.oreilly.com/library/view/~/9781492067498</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067498/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067498/?ar">https://learning.oreilly.com/library/view/~/9781492067498/?ar</a><br/>Format: Electronic Resources<br/>Serious cryptography : a practical introduction to modern encryptionent://SD_ILS/0/SD_ILS:23162082024-06-15T12:38:29Z2024-06-15T12:38:29Zby Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format: Electronic Resources<br/>Getting started with z/OS data set encryptionent://SD_ILS/0/SD_ILS:23169372024-06-15T12:38:29Z2024-06-15T12:38:29Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:23144162024-06-15T12:38:29Z2024-06-15T12:38:29Zby Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>Encryption : toward secure systemsent://SD_ILS/0/SD_ILS:23108272024-06-15T12:38:29Z2024-06-15T12:38:29Zby Sletten, Brian, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491944363/?ar">https://go.oreilly.com/library-access/library/view/-/9781491944363/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491944363/?ar">https://learning.oreilly.com/videos/~/9781491944363/?ar</a><br/>Format: Electronic Resources<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:20981522024-06-15T12:38:29Z2024-06-15T12:38:29Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192079">Click to View</a><br/>Format: Electronic Resources<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:22135412024-06-15T12:38:29Z2024-06-15T12:38:29Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5161932">Click to View</a><br/>Format: Electronic Resources<br/>Crafting the InfoSec playbookent://SD_ILS/0/SD_ILS:23073922024-06-15T12:38:29Z2024-06-15T12:38:29Zby Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:23090732024-06-15T12:38:29Z2024-06-15T12:38:29Zby Vasudevan, Vinod, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287692/?ar">https://learning.oreilly.com/library/view/~/9781849287692/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287692/?ar</a><br/>Format: Electronic Resources<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:23087532024-06-15T12:38:29Z2024-06-15T12:38:29Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119092438">https://learning.oreilly.com/library/view/~/9781119092438</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar">https://go.oreilly.com/library-access/library/view/-/9781119092438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119092438/?ar">https://learning.oreilly.com/library/view/~/9781119092438/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of securityent://SD_ILS/0/SD_ILS:23069642024-06-15T12:38:29Z2024-06-15T12:38:29Zby Arthur, Will, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265849/?ar">https://learning.oreilly.com/library/view/~/9781430265849/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265849/?ar</a><br/>Format: Electronic Resources<br/>The InfoSec handbook : an introduction to information securityent://SD_ILS/0/SD_ILS:23043932024-06-15T12:38:29Z2024-06-15T12:38:29Zby Rao, Umesh Hodeghatta, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263838">https://learning.oreilly.com/library/view/~/9781430263838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263838/?ar">https://learning.oreilly.com/library/view/~/9781430263838/?ar</a><br/>Format: Electronic Resources<br/>Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:23042752024-06-15T12:38:29Z2024-06-15T12:38:29Zby Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:23026232024-06-15T12:38:29Z2024-06-15T12:38:29Zby Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format: Electronic Resources<br/>Salt at scale : lessons from LinkedInent://SD_ILS/0/SD_ILS:23082162024-06-15T12:38:29Z2024-06-15T12:38:29Zby Sebenik, Craig, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781491920893/?ar">https://learning.oreilly.com/videos/~/9781491920893/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar">https://go.oreilly.com/library-access/library/view/-/9781491920893/?ar</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:22061692024-06-15T12:38:29Z2024-06-15T12:38:29Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:23134822024-06-15T12:38:29Z2024-06-15T12:38:29Zby Brooks, R. R. (Richard R.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar">https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123">https://learning.oreilly.com/library/view/~/9781482214123</a>
<a href="https://learning.oreilly.com/library/view/~/9781482214123/?ar">https://learning.oreilly.com/library/view/~/9781482214123/?ar</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption : a practical guide to secure computingent://SD_ILS/0/SD_ILS:23004102024-06-15T12:38:29Z2024-06-15T12:38:29Zby Loshin, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114838">https://learning.oreilly.com/library/view/~/9780124114838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124114838/?ar">https://learning.oreilly.com/library/view/~/9780124114838/?ar</a><br/>Format: Electronic Resources<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:22931732024-06-15T12:38:29Z2024-06-15T12:38:29Zby Paul, Goutam.<br/><a href="https://learning.oreilly.com/library/view/~/9781439831373">https://learning.oreilly.com/library/view/~/9781439831373</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar">https://go.oreilly.com/library-access/library/view/-/9781439831373/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439831373/?ar">https://learning.oreilly.com/library/view/~/9781439831373/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:22959512024-06-15T12:38:29Z2024-06-15T12:38:29Zby ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography with Open-Source Software.ent://SD_ILS/0/SD_ILS:23070162024-06-15T12:38:29Z2024-06-15T12:38:29Zby McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format: Electronic Resources<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:21317082024-06-15T12:38:29Z2024-06-15T12:38:29Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1633743">Click to View</a><br/>Format: Electronic Resources<br/>Hashing in computer science : fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:22893602024-06-15T12:38:29Z2024-06-15T12:38:29Zby Konheim, Alan G., 1934-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar">https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834/?ar">https://learning.oreilly.com/library/view/~/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834">https://learning.oreilly.com/library/view/~/9781118031834</a><br/>Format: Electronic Resources<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:22859862024-06-15T12:38:29Z2024-06-15T12:38:29Zby Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>Modern cryptanalysis : techniques for advanced code breakingent://SD_ILS/0/SD_ILS:22846272024-06-15T12:38:29Z2024-06-15T12:38:29Zby Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format: Electronic Resources<br/>Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchangeent://SD_ILS/0/SD_ILS:23107702024-06-15T12:38:29Z2024-06-15T12:38:29Zby Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format: Electronic Resources<br/>Encryption facility for z/OS version 1.10ent://SD_ILS/0/SD_ILS:23351072024-06-15T12:38:29Z2024-06-15T12:38:29Zby Kappeler, Patrick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738489557/?ar">https://go.oreilly.com/library-access/library/view/-/0738489557/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557">https://learning.oreilly.com/library/view/~/0738489557</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557/?ar">https://learning.oreilly.com/library/view/~/0738489557/?ar</a><br/>Format: Electronic Resources<br/>Writing secure code : practical strategies and proven techniques for building secure applications in a networked worldent://SD_ILS/0/SD_ILS:22811582024-06-15T12:38:29Z2024-06-15T12:38:29Zby Howard, Michael, 1965- author.<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format: Electronic Resources<br/>Secure XML : the New Syntax for Signatures and Encryption.ent://SD_ILS/0/SD_ILS:22904912024-06-15T12:38:29Z2024-06-15T12:38:29Zby Niles, Kitty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201756056/?ar">https://go.oreilly.com/library-access/library/view/-/0201756056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056">https://learning.oreilly.com/library/view/~/0201756056</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056/?ar">https://learning.oreilly.com/library/view/~/0201756056/?ar</a><br/>Format: Electronic Resources<br/>