Search Results for - Narrowed by: 2009 - Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue?dt=list 2024-07-17T16:49:01Z Managing Information Risk and the Economics of Security ent://SD_ILS/0/SD_ILS:164782 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Johnson, M. Eric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Initiatives to Secure Cyberspace An Emerging Landscape ent://SD_ILS/0/SD_ILS:164783 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Portnoy, Michael. editor.&#160;Goodman, Seymour. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:167010 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Li, Stan Z. editor.&#160;Jain, Anil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73003-5">http://dx.doi.org/10.1007/978-0-387-73003-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Systems Security Certification ent://SD_ILS/0/SD_ILS:167460 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Damiani, Ernesto. author.&#160;Ardagna, Claudio Agostino. author.&#160;El Ioini, Nabil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety-Critical Systems: Problems, Process and Practice Proceedings of the Seventeenth Safety-Critical Systems Symposium, Brighton, UK, 3&ndash;5 February 2009 ent://SD_ILS/0/SD_ILS:175957 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Dale, Chris. editor.&#160;Anderson, Tom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84882-349-5">http://dx.doi.org/10.1007/978-1-84882-349-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Les virus informatiques: th&eacute;orie, pratique et applications ent://SD_ILS/0/SD_ILS:176476 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Filiol, &Eacute;ric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-287-98240-8">http://dx.doi.org/10.1007/978-2-287-98240-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189426 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Garg, Vijay. editor.&#160;Wattenhofer, Roger. editor.&#160;Kothapalli, Kishore. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-92295-7">http://dx.doi.org/10.1007/978-3-540-92295-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189693 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Reingold, Omer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189648 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Chung, Kyo-Il. editor.&#160;Sohn, Kiwook. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00306-6">http://dx.doi.org/10.1007/978-3-642-00306-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Methods for Counterterrorism ent://SD_ILS/0/SD_ILS:189900 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Argamon, Shlomo. editor.&#160;Howard, Newton. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01141-2">http://dx.doi.org/10.1007/978-3-642-01141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science IV Special Issue on Security in Computing ent://SD_ILS/0/SD_ILS:189853 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;Moreno, Edward David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01004-0">http://dx.doi.org/10.1007/978-3-642-01004-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008 Revised Selected Papers ent://SD_ILS/0/SD_ILS:190007 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Degano, Pierpaolo. editor.&#160;Guttman, Joshua. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01465-9">http://dx.doi.org/10.1007/978-3-642-01465-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management III Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190202 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Ferrari, Elena. editor.&#160;Li, Ninghui. editor.&#160;Bertino, Elisa. editor.&#160;Karabulut, Yuecel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02056-8">http://dx.doi.org/10.1007/978-3-642-02056-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190378 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Boyd, Colin. editor.&#160;Gonz&aacute;lez Nieto, Juan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02620-1">http://dx.doi.org/10.1007/978-3-642-02620-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XXIII 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190488 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Gudes, Ehud. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03007-9">http://dx.doi.org/10.1007/978-3-642-03007-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190540 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Goldberg, Ian. editor.&#160;Atallah, Mikhail J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03168-7">http://dx.doi.org/10.1007/978-3-642-03168-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190725 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03748-1">http://dx.doi.org/10.1007/978-3-642-03748-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design V FOSAD 2007/2008/2009 Tutorial Lectures ent://SD_ILS/0/SD_ILS:190753 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Aldini, Alessandro. editor.&#160;Barthe, Gilles. editor.&#160;Gorrieri, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03829-7">http://dx.doi.org/10.1007/978-3-642-03829-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190823 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Jahankhani, Hamid. editor.&#160;Hessami, Ali G. editor.&#160;Hsu, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04062-7">http://dx.doi.org/10.1007/978-3-642-04062-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identity Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190847 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Ryan, Peter Y. A. editor.&#160;Schoenmakers, Berry. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04135-8">http://dx.doi.org/10.1007/978-3-642-04135-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190848 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Clavier, Christophe. editor.&#160;Gaj, Kris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04138-9">http://dx.doi.org/10.1007/978-3-642-04138-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191078 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Mambo, Masahiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety and Security in Multiagent Systems Research Results from 2004-2006 ent://SD_ILS/0/SD_ILS:191086 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Barley, Mike. editor.&#160;Mouratidis, Haralambos. editor.&#160;Unruh, Amy. editor.&#160;Spears, Diana. editor.&#160;Scerri, Paul. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04879-1">http://dx.doi.org/10.1007/978-3-642-04879-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191095 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04904-0">http://dx.doi.org/10.1007/978-3-642-04904-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software and Data Technologies Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191192 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Cordeiro, Jos&eacute;. editor.&#160;Shishkov, Boris. editor.&#160;Ranchordas, AlpeshKumar. editor.&#160;Helfert, Markus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05201-9">http://dx.doi.org/10.1007/978-3-642-05201-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191214 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Chen, Yan. editor.&#160;Dimitriou, Tassos D. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191592 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Qing, Sihan. editor.&#160;Mitchell, Chris J. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings. ent://SD_ILS/0/SD_ILS:189738 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Chen, Liqun. editor.&#160;Mitchell, Chris J. editor.&#160;Martin, Andrew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00587-9">http://dx.doi.org/10.1007/978-3-642-00587-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2009 The Cryptographers&rsquo; Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189815 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Fischlin, Marc. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00862-7">http://dx.doi.org/10.1007/978-3-642-00862-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189836 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Kaklamanis, Christos. editor.&#160;Nielson, Flemming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00945-7">http://dx.doi.org/10.1007/978-3-642-00945-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Active and Programmable Networks IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:189844 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Hutchison, David. editor.&#160;Denazis, Spyros. editor.&#160;Lefevre, Laurent. editor.&#160;Minden, Gary J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00972-3">http://dx.doi.org/10.1007/978-3-642-00972-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189852 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Joux, Antoine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01001-9">http://dx.doi.org/10.1007/978-3-642-01001-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18&ndash;20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189928 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Gritzalis, Dimitris. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Evaluation of Electronic Voting Requirements and Evaluation Procedures to Support Responsible Election Authorities ent://SD_ILS/0/SD_ILS:190078 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Volkamer, Melanie. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01662-2">http://dx.doi.org/10.1007/978-3-642-01662-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189996 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Yung, Moti. editor.&#160;Liu, Peng. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01440-6">http://dx.doi.org/10.1007/978-3-642-01440-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IV ent://SD_ILS/0/SD_ILS:190112 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01757-5">http://dx.doi.org/10.1007/978-3-642-01757-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Future of Identity in the Information Society ent://SD_ILS/0/SD_ILS:190132 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Rannenberg, Kai. editor.&#160;Royer, Denis. editor.&#160;Deuker, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01820-6">http://dx.doi.org/10.1007/978-3-642-01820-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pervasive Computing 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190024 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Tokuda, Hideyuki. editor.&#160;Beigl, Michael. editor.&#160;Friday, Adrian. editor.&#160;Brush, A. J. Bernheim. editor.&#160;Tobe, Yoshito. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01516-8">http://dx.doi.org/10.1007/978-3-642-01516-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communications 7th International Conference, WWIC 2009, Enschede, The Netherlands, May 27-29, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190222 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Berg, Hans. editor.&#160;Heijenk, Geert. editor.&#160;Osipov, Evgeny. editor.&#160;Staehle, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02118-3">http://dx.doi.org/10.1007/978-3-642-02118-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2009 Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190306 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02384-2">http://dx.doi.org/10.1007/978-3-642-02384-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190404 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Gonz&aacute;lez Nieto, Juan. editor.&#160;Reif, Wolfgang. editor.&#160;Wang, Guojun. editor.&#160;Indulska, Jadwiga. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02704-8">http://dx.doi.org/10.1007/978-3-642-02704-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190460 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Flegel, Ulrich. editor.&#160;Bruschi, Danilo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02918-9">http://dx.doi.org/10.1007/978-3-642-02918-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190588 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Cvr&#269;ek, Daniel. editor.&#160;&Scaron;venda, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03315-5">http://dx.doi.org/10.1007/978-3-642-03315-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190600 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Halevi, Shai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03356-8">http://dx.doi.org/10.1007/978-3-642-03356-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:190657 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Dingledine, Roger. editor.&#160;Golle, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03549-4">http://dx.doi.org/10.1007/978-3-642-03549-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190855 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Avanzi, Roberto Maria. editor.&#160;Keliher, Liam. editor.&#160;Sica, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190946 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Katzenbeisser, Stefan. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04431-1">http://dx.doi.org/10.1007/978-3-642-04431-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190950 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Backes, Michael. editor.&#160;Ning, Peng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190960 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Buth, Bettina. editor.&#160;Rabe, Gerd. editor.&#160;Seyfarth, Till. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190962 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;Martinelli, Fabio. editor.&#160;Ardagna, Claudio A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04474-8">http://dx.doi.org/10.1007/978-3-642-04474-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191012 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Pieprzyk, Josef. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2009 Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II ent://SD_ILS/0/SD_ILS:191173 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Meersman, Robert. editor.&#160;Dillon, Tharam. editor.&#160;Herrero, Pilar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05151-7">http://dx.doi.org/10.1007/978-3-642-05151-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings ent://SD_ILS/0/SD_ILS:191053 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;J&oslash;sang, Audun. editor.&#160;Maseng, Torleiv. editor.&#160;Knapskog, Svein Johan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04766-4">http://dx.doi.org/10.1007/978-3-642-04766-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> iNetSec 2009 &ndash; Open Research Problems in Network Security IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191270 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05437-2">http://dx.doi.org/10.1007/978-3-642-05437-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191273 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Jacobson, Michael J. editor.&#160;Rijmen, Vincent. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191346 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Matsui, Mitsuru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191365 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Garay, Juan A. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10433-6">http://dx.doi.org/10.1007/978-3-642-10433-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191472 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Prakash, Atul. editor.&#160;Sen Gupta, Indranil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191491 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Youm, Heung Youl. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10838-9">http://dx.doi.org/10.1007/978-3-642-10838-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191500 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Parker, Matthew G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future of Trust in Computing Proceedings of the First International Conference Future of Trust in Computing 2008 ent://SD_ILS/0/SD_ILS:199446 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Gawrock, David. editor.&#160;Reimer, Helmut. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Vishik, Claire. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9324-6">http://dx.doi.org/10.1007/978-3-8348-9324-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Awareness Neue Wege zur erfolgreichen Mitarbeiter-Sensibilisierung ent://SD_ILS/0/SD_ILS:199703 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Helisch, Michael. editor.&#160;Pokoyski, Dietmar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9594-3">http://dx.doi.org/10.1007/978-3-8348-9594-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kryptologie Eine Einf&uuml;hrung in die Wissenschaft vom Verschl&uuml;sseln, Verbergen und Verheimlichen. ent://SD_ILS/0/SD_ILS:199715 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Beutelspacher, Albrecht. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9606-3">http://dx.doi.org/10.1007/978-3-8348-9606-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sicherheit und Vertrauen in der mobilen Informationsund Kommunikationstechnologie Tagungsband zur EICT-Konferenz IT-Sicherheit ent://SD_ILS/0/SD_ILS:200019 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Bub, Udo. editor.&#160;Wolfenstetter, Klaus-Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9990-3">http://dx.doi.org/10.1007/978-3-8348-9990-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT-Risiko-Management mit System Von den Grundlagen bis zur Realisierung &ndash; Ein praxisorientierter Leitfaden ent://SD_ILS/0/SD_ILS:200022 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;K&ouml;nigs, Hans-Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9993-4">http://dx.doi.org/10.1007/978-3-8348-9993-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Finite Automata and Application to Cryptography ent://SD_ILS/0/SD_ILS:188068 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Tao, Renji. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing Systems Challenges, Approaches and Solutions ent://SD_ILS/0/SD_ILS:188131 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Biskup, Joachim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78442-5">http://dx.doi.org/10.1007/978-3-540-78442-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Engineering for Service-Oriented Architectures ent://SD_ILS/0/SD_ILS:188468 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Hafner, Michael. author.&#160;Breu, Ruth. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79539-1">http://dx.doi.org/10.1007/978-3-540-79539-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189098 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Software and Systems First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189610 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Massacci, Fabio. editor.&#160;Redwine, Samuel T. editor.&#160;Zannone, Nicola. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00199-4">http://dx.doi.org/10.1007/978-3-642-00199-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189787 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Lee, Pil Joong. editor.&#160;Cheon, Jung Hee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xi&rsquo;an, China, April 13-15, 2009 Proceedings ent://SD_ILS/0/SD_ILS:189810 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Bao, Feng. editor.&#160;Li, Hui. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00843-6">http://dx.doi.org/10.1007/978-3-642-00843-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2009 Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I ent://SD_ILS/0/SD_ILS:191172 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Meersman, Robert. editor.&#160;Dillon, Tharam. editor.&#160;Herrero, Pilar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05148-7">http://dx.doi.org/10.1007/978-3-642-05148-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated Management of Systems, Services, Processes and People in IT 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, Venice, Italy, October 27-28, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191119 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Bartolini, Claudio. editor.&#160;Gaspary, Luciano Paschoal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04989-7">http://dx.doi.org/10.1007/978-3-642-04989-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191165 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Guerraoui, Rachid. editor.&#160;Petit, Franck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05118-0">http://dx.doi.org/10.1007/978-3-642-05118-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191307 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Desmedt, Yvo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10230-1">http://dx.doi.org/10.1007/978-3-642-10230-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191308 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Gal, Cecilia S. editor.&#160;Kantor, Paul B. editor.&#160;Lesk, Michael E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Communication and Networking Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191309 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Kim, Tai-hoon. editor.&#160;Yang, Laurence T. editor.&#160;Park, Jong Hyuk. editor.&#160;Chang, Alan Chin-Chen. editor.&#160;Vasilakos, Thanos. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10236-3">http://dx.doi.org/10.1007/978-3-642-10236-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security Technology International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191311 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Kim, Haeng-kon. editor.&#160;Kim, Tai-hoon. editor.&#160;Kiumi, Akingbehin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10240-0">http://dx.doi.org/10.1007/978-3-642-10240-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Generation Information Technology First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009. Proceedings ent://SD_ILS/0/SD_ILS:191389 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Lee, Young-hoon. editor.&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-chi. editor.&#160;&#346;l&#281;zak, Dominik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10509-8">http://dx.doi.org/10.1007/978-3-642-10509-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191425 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Datta, Anupam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191427 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Roy, Bimal. editor.&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10628-6">http://dx.doi.org/10.1007/978-3-642-10628-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Programming Languages and Systems 7th Asian Symposium, APLAS 2009, Seoul, Korea, December 14-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191441 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Hu, Zhenjiang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10672-9">http://dx.doi.org/10.1007/978-3-642-10672-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conference ent://SD_ILS/0/SD_ILS:199411 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9283-6">http://dx.doi.org/10.1007/978-3-8348-9283-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Das IT-Gesetz: Compliance in der IT-Sicherheit Leitfaden f&uuml;r ein Regelwerk zur IT-Sicherheit im Unternehmen ent://SD_ILS/0/SD_ILS:199670 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Gr&uuml;nendahl, Ralf-T. author.&#160;Steinbacher, Andreas F. author.&#160;Will, Peter H. L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9559-2">http://dx.doi.org/10.1007/978-3-8348-9559-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security governance a practical development and implementation approach ent://SD_ILS/0/SD_ILS:297743 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:288744 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Collette, Ronald D.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:289700 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Hill, David G. (David Gary), 1943-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management metrics a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:291373 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information warfare ent://SD_ILS/0/SD_ILS:304069 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Ventre, Daniel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a> <a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a> OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Multi-Party Non-Repudiation Protocols and Applications ent://SD_ILS/0/SD_ILS:167284 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Onieva, Jos&eacute; A. author.&#160;Lopez, Javier. author.&#160;Zhou, Jianying. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> High Assurance Services Computing ent://SD_ILS/0/SD_ILS:167831 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Zhang, Liang-Jie. editor.&#160;Paul, Raymond. editor.&#160;Dong, Jing. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-87658-0">http://dx.doi.org/10.1007/978-0-387-87658-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning in Cyber Trust Security, Privacy, and Reliability ent://SD_ILS/0/SD_ILS:167900 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Yu, Philip S. editor.&#160;Tsai, Jeffrey J. P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88735-7">http://dx.doi.org/10.1007/978-0-387-88735-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Dependability for Ambient Intelligence ent://SD_ILS/0/SD_ILS:167907 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Kokolakis, Spyros. editor.&#160;G&oacute;mez, Antonio Ma&ntilde;a. editor.&#160;Spanoudakis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88775-3">http://dx.doi.org/10.1007/978-0-387-88775-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Key Establishment ent://SD_ILS/0/SD_ILS:167859 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Choo, Kim-Kwang Raymond. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management for Service-Oriented Environments ent://SD_ILS/0/SD_ILS:171928 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Malik, Zaki. author.&#160;Bouguettaya, Athman. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0310-5">http://dx.doi.org/10.1007/978-1-4419-0310-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effectiveness of personal data protection : automated processing of criminal justice management ent://SD_ILS/0/SD_ILS:135228 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Matjas, Tatjana.<br/>Preferred Shelf Number&#160;K3264.C65 M38 2009<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Managing and Mining Uncertain Data ent://SD_ILS/0/SD_ILS:164752 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Aggarwal, Charu C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09690-2">http://dx.doi.org/10.1007/978-0-387-09690-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primality Testing and Integer Factorization in Public-Key Cryptography ent://SD_ILS/0/SD_ILS:167452 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic Cryptanalysis ent://SD_ILS/0/SD_ILS:167905 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Bard, Gregory V. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88757-9">http://dx.doi.org/10.1007/978-0-387-88757-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:167947 2024-07-17T16:49:01Z 2024-07-17T16:49:01Z Author&#160;Singh, Abhishek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>