Search Results

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Java programlama diliyle kriptoloji uygulamaları / by Bodur, Hüseyin

    Published 2016
    View in OPAC
    Book
  2. 2

    Yazılım güvenliği saldırı ve savunma / by Demir, Bünyamin

    View in OPAC
    Book
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Reconfigurable Cryptographic Processor by Liu, Leibo, Wang, Bo, Wei, Shaojun

    Published 2018
    Full-text access
    View in OPAC
    e-Book
  8. 8

    The Hardware Trojan War Attacks, Myths, and Defenses /

    Published 2018
    Full-text access
    View in OPAC
    e-Book
  9. 9
  10. 10

    Steganography Techniques for Digital Images by Yahya, Abid

    Published 2019
    Full-text access
    View in OPAC
    e-Book
  11. 11

    Hardware Protection through Obfuscation

    Published 2017
    Full-text access
    View in OPAC
    e-Book
  12. 12

    Hardware IP Security and Trust

    Published 2017
    Full-text access
    View in OPAC
    e-Book
  13. 13

    Mobile and Wireless Technologies 2016

    Published 2016
    Full-text access
    View in OPAC
    e-Book
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Cryptography and network security : principles and practice / by Stallings, William

    Published 2014
    View in OPAC
    Book