Search Results for 2 - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d2$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2025-12-22T11:48:34Z Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:253989 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Beale, Jay.&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:254005 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Beale, Jay.&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Paul, Mano., author.<br/>Preferred Shelf Number&#160;QA76.76 .D47 P3775 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:402118 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:148029 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the ISSMP CBK ent://SD_ILS/0/SD_ILS:544375 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;QA76.9 .A25 O34 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484518 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249&#160;Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Development of Transport by Telematics 19th International Conference on Transport System Telematics, TST 2019, Jaworze, Poland, February 27 &ndash; March 2, 2019, Selected Papers ent://SD_ILS/0/SD_ILS:482729 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Mikulski, Jerzy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-27547-1">https://doi.org/10.1007/978-3-030-27547-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21&ndash;22, 2018, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:483285 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Santosh, K. C. editor.&#160;Hegadi, Ravindra S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486786 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Kosta, Eleni. editor.&#160;Pierson, Jo. editor.&#160;Slamanig, Daniel. editor. (orcid)0000-0002-4181-2561&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;Krenn, Stephan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16744-8">https://doi.org/10.1007/978-3-030-16744-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics Second International Conference, ICETCE 2019, Jaipur, India, February 1&ndash;2, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486818 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Somani, Arun K. editor.&#160;Ramakrishna, Seeram. editor. (orcid)0000-0001-8479-8686&#160;Chaudhary, Anil. editor.&#160;Choudhary, Chothmal. editor.&#160;Agarwal, Basant. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-8300-7">https://doi.org/10.1007/978-981-13-8300-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:483462 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Carlet, Claude. editor.&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534&#160;Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Systems 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483194 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Bordeleau, Francis. editor.&#160;Sillitti, Alberto. editor.&#160;Meirelles, Paulo. editor. (orcid)0000-0002-8923-2814&#160;Lenarduzzi, Valentina. editor. (orcid)0000-0003-0511-5133&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20883-7">https://doi.org/10.1007/978-3-030-20883-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Digital Forensic Data Volume 2: Quick Analysis for Evidence and Intelligence ent://SD_ILS/0/SD_ILS:399251 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Quick, Darren. author.&#160;Choo, Kim-Kwang Raymond. author. (orcid)0000-0001-9208-5336&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0263-3">https://doi.org/10.1007/978-981-13-0263-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:400767 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Karuppayah, Shankar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401948 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Matou&scaron;ek, Petr. editor.&#160;Schmiedecker, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402215 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hancke, Gerhard P. editor.&#160;Damiani, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:399520 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Quaglia, Elizabeth A. editor.&#160;Tomasin, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401491 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hansen, Marit. editor.&#160;Kosta, Eleni. editor.&#160;Nai-Fovino, Igor. editor.&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399860 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Galinina, Olga. editor. (orcid)0000-0002-5386-1061&#160;Andreev, Sergey. editor. (orcid)0000-0001-8223-3665&#160;Balandin, Sergey. editor. (orcid)0000-0003-3238-4830&#160;Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Cura&ccedil;ao, February 26 &ndash; March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399957 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Meiklejohn, Sarah. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image and Signal Processing 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401996 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Mansouri, Alamin. editor.&#160;El Moataz, Abderrahim. editor.&#160;Nouboud, Fathallah. editor.&#160;Mammass, Driss. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94211-7">https://doi.org/10.1007/978-3-319-94211-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485594 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Holz, Thorsten. editor. (orcid)0000-0002-2783-1264&#160;Ioannidis, Sotiris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488947 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Eckert, Claudia. editor.&#160;Katsikas, Sokratis K. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489000 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Villari, Massimo. editor.&#160;Zimmermann, Wolf. editor.&#160;Lau, Kung-Kiu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:488634 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Proudler, Graeme. author.&#160;Chen, Liqun. author.&#160;Dalton, Chris. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489060 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hansen, Marit. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Leenes, Ronald. editor.&#160;Whitehouse, Diane. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488522 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Gladyshev, Pavel. editor.&#160;Marrington, Andrew. editor.&#160;Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Williams, Barry L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 .W5495 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Next generation SSH2 implementation securing data in motion ent://SD_ILS/0/SD_ILS:146275 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Liu, Dale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The healthy PC preventive care, home remedies, and green computing ent://SD_ILS/0/SD_ILS:293464 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hart-Davis, Guy.&#160;Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A&rsquo;dan Z&rsquo;ye siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:524303 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Polat, A. Can.&#160;Karaka&#351;, Burak.<br/>Preferred Shelf Number&#160;QA76.9 P65 2023<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> T&uuml;rkiye&rsquo;de ve d&uuml;nyada siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:514958 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;&Ccedil;elikta&#351;, Bar&#305;&#351; .<br/>Preferred Shelf Number&#160;UG485 C45 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Uygulamalarla siber g&uuml;venli&#287;e giri&#351; ent://SD_ILS/0/SD_ILS:510151 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;TK5105.59.A39 U94 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Yeni ba&#351;layanlar i&ccedil;in bilgi g&uuml;venli&#287;i ve uygulamal&#305; hacking y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:423184 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Aslanbakan, Enes, yazar<br/>Preferred Shelf Number&#160;QA76.9.A25 A75 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Advanced Information Systems Engineering 31st International Conference, CAiSE 2019, Rome, Italy, June 3&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:482678 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Giorgini, Paolo. editor. (orcid)0000-0003-4152-9683&#160;Weber, Barbara. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21290-2">https://doi.org/10.1007/978-3-030-21290-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483504 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146&#160;Gauthier-Uma&ntilde;a, Val&eacute;rie. editor. (orcid)0000-0003-0909-7091&#160;Ochoa, Mart&iacute;n. editor. (orcid)0000-0002-7816-5775&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection International Workshops of PAAMS 2019, &Aacute;vila, Spain, June 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483654 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;De La Prieta, Fernando. editor. (orcid)0000-0002-8239-5020&#160;Gonz&aacute;lez-Briones, Alfonso. editor.&#160;Pawleski, Pawel. editor.&#160;Calvaresi, Davide. editor. (orcid)0000-0001-9816-7439&#160;Del Val, Elena. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24299-2">https://doi.org/10.1007/978-3-030-24299-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 17th International Conference, CARDIS 2018, Montpellier, France, November 12&ndash;14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485324 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Bilgin, Beg&uuml;l. editor.&#160;Fischer, Jean-Bernard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15462-2">https://doi.org/10.1007/978-3-030-15462-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developments in information security and cybernetic wars ent://SD_ILS/0/SD_ILS:482187 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Sarfraz, Muhammad, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482982 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Zhang, Huanguo. editor.&#160;Zhao, Bo. editor.&#160;Yan, Fei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management XIII 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483009 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Cofta, Piotr. editor.&#160;Jensen, Christian Damsgaard. editor.&#160;Grandison, Tyrone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-33716-2">https://doi.org/10.1007/978-3-030-33716-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483024 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hamid, Brahim. editor.&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059&#160;Elovici, Yuval. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:483034 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Yang, Qiang. editor.&#160;Zhou, Zhi-Hua. editor.&#160;Gong, Zhiguo. editor.&#160;Zhang, Min-Ling. editor.&#160;Huang, Sheng-Jun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16142-2">https://doi.org/10.1007/978-3-030-16142-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Usta, G&ouml;khan.<br/>Preferred Shelf Number&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483391 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814&#160;Ant&oacute;n, Annie. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13&ndash;14, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483496 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Li, Jin. editor.&#160;Liu, Zheli. editor.&#160;Peng, Hao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8&ndash;9, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486352 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941&#160;Toma, Cristian. editor. (orcid)0000-0001-9316-7739&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018, Kolkata, India ent://SD_ILS/0/SD_ILS:486482 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Chakraborty, Mohuya. editor.&#160;Chakrabarti, Satyajit. editor.&#160;Balas, Valentina Emilia. editor.&#160;Mandal, J. K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1544-2">https://doi.org/10.1007/978-981-13-1544-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ECML PKDD 2018 Workshops Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486954 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Alzate, Carlos. editor. (orcid)0000-0003-2434-2534&#160;Monreale, Anna. editor. (orcid)0000-0001-8541-0284&#160;Assem, Haytham. editor.&#160;Bifet, Albert. editor.&#160;Buda, Teodora Sandra. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-13453-2">https://doi.org/10.1007/978-3-030-13453-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Security Properties on Commodity Computing Platforms The uber eXtensible Micro-Hypervisor Framework ent://SD_ILS/0/SD_ILS:482868 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Vasudevan, Amit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25049-2">https://doi.org/10.1007/978-3-030-25049-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483099 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131&#160;Lopez, Javier. editor. (orcid)0000-0001-8066-9991&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Exploit geli&#351;tirme 101 ent://SD_ILS/0/SD_ILS:389077 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;QA76.9.A25 A59 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Modeling Decisions for Artificial Intelligence 15th International Conference, MDAI 2018, Mallorca, Spain, October 15&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399104 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Torra, Vicen&ccedil;. editor. (orcid)0000-0002-0368-8037&#160;Narukawa, Yasuo. editor.&#160;Aguil&oacute;, Isabel. editor.&#160;Gonz&aacute;lez-Hidalgo, Manuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00202-2">https://doi.org/10.1007/978-3-030-00202-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multi-Agent Systems and Agreement Technologies 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399113 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Belardinelli, Francesco. editor. (orcid)0000-0002-7768-1794&#160;Argente, Estefan&iacute;a. editor. (orcid)0000-0002-5431-3868&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01713-2">https://doi.org/10.1007/978-3-030-01713-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Combinatorial Algorithms 29th International Workshop, IWOCA 2018, Singapore, July 16&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400158 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Iliopoulos, Costas. editor.&#160;Leong, Hon Wai. editor.&#160;Sung, Wing-Kin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94667-2">https://doi.org/10.1007/978-3-319-94667-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401646 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Giuffrida, Cristiano. editor.&#160;Bardin, S&eacute;bastien. editor.&#160;Blanc, Gregory. editor. (orcid)0000-0001-8150-6617&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13&ndash;15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399528 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973&#160;Teglia, Yannick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400045 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X&#160;Kuty&#322;owski, Miros&#322;aw. editor. (orcid)0000-0003-3192-2430&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Ad-hoc and Sensor Networks 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400856 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Zhu, Liehuang. editor.&#160;Zhong, Sheng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8890-2">https://doi.org/10.1007/978-981-10-8890-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:401003 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401486 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Mori, Paolo. editor.&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Camp, Olivier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:401517 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Yuan, Hanning. editor.&#160;Geng, Jing. editor.&#160;Liu, Chuanlu. editor.&#160;Bian, Fuling. editor.&#160;Surapunt, Tisinee. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0893-2">https://doi.org/10.1007/978-981-13-0893-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:399039 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Nicholson, Denise. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing Usable and Secure Software with IRIS and CAIRIS ent://SD_ILS/0/SD_ILS:401826 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Faily, Shamal. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75493-2">https://doi.org/10.1007/978-3-319-75493-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:543620 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M85 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Preferred Shelf Number&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Cyber and electromagnetic threats in modern relay protection ent://SD_ILS/0/SD_ILS:543446 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Gurevich, Vladimir, 1956, author.<br/>Preferred Shelf Number&#160;TK2861 .G87 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:484756 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Pino, Robinson E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486886 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Lluch Lafuente, Alberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05119-2">https://doi.org/10.1007/978-3-319-05119-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:486874 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Faloutsos, Michalis. editor.&#160;Kuzmanovic, Aleksandar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04918-2">https://doi.org/10.1007/978-3-319-04918-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486701 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Sideridis, Alexander B. editor.&#160;Kardasiadou, Zoe. editor.&#160;Yialouris, Constantine P. editor.&#160;Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489066 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489068 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Meier, Willi. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trustworthy Service Composition The Aniketos Approach ent://SD_ILS/0/SD_ILS:485813 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Brucker, Achim. editor.&#160;Dalpiaz, Fabiano. editor. (orcid)0000-0003-4480-3887&#160;Giorgini, Paolo. editor.&#160;Meland, Per H&aring;kon. editor.&#160;Rios, Erkuden. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13518-2">https://doi.org/10.1007/978-3-319-13518-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489025 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Domingo-Ferrer, Josep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11257-2">https://doi.org/10.1007/978-3-319-11257-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489033 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Saad, Walid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:544118 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S734 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S7354 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:539725 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Preferred Shelf Number&#160;HD61.5 .L36 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:539726 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;DeFranco, Joanna F., author.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Elementary information security ent://SD_ILS/0/SD_ILS:271272 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Smith, Richard E.<br/>Preferred Shelf Number&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Delivering London 2012 ICT implementation and operations ent://SD_ILS/0/SD_ILS:509889 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;IET, ed.<br/>Preferred Shelf Number&#160;XX(509889.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:545715 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Bahi, Jacques Mohcine., author.&#160;Guyeux, Christophe.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B344 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;HV8290 .B34 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:547855 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;TK5105.59 .H3532 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Secret history : the story of cryptology ent://SD_ILS/0/SD_ILS:365258 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Bauer, Craig P.<br/>Preferred Shelf Number&#160;QA76.9.A25 B384 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:541429 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Doherty, Eamon P., author.<br/>Preferred Shelf Number&#160;HV8079 .C65 D64 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439898789">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;HD30.38 .B76 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:540169 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Raghunathan, Balaji., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R338 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:544612 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Patil, Harsh Kupwade., author.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P38 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Preferred Shelf Number&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Preferred Shelf Number&#160;TK5105.59 M48 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:313473 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Stallings, William.&#160;Brown, Lawrie<br/>Preferred Shelf Number&#160;QA76.9 S73 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:541627 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Ganguly, Debashis., author.&#160;Lahiri, Shibamouli.<br/>Preferred Shelf Number&#160;TK5105.59 .G36 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The 7 qualities of highly secure software ent://SD_ILS/0/SD_ILS:544951 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Paul, Mano., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P38 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439814475">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:545796 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Masud, Mehedy., author.&#160;Khan, Latifur.&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;QA76.9 .D343 M385 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:538754 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Paul, Goutam., author.&#160;Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number&#160;QA76.9 .A25 P385 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:543119 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Macaulay, Tyson., author.&#160;Singer, Bryan.<br/>Preferred Shelf Number&#160;TS156.8 .M328 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Social engineering : the art of human hacking ent://SD_ILS/0/SD_ILS:377976 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hadnagy, Christopher.<br/>Preferred Shelf Number&#160;QA76.9.C66 H33 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Preferred Shelf Number&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Windows platforms and applications ent://SD_ILS/0/SD_ILS:271537 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Solomon, Michael.<br/>Preferred Shelf Number&#160;QA76.76.O63 S64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:271539 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J3638 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:271251 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Gibson, Darril.<br/>Preferred Shelf Number&#160;QA76.9.A25 G5 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:313297 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA76.9 A25 P45 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:539761 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Liu, Lei, 1968, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 L587 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:540614 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Dua, Sumeet., author.&#160;Du, Xian.<br/>Preferred Shelf Number&#160;QA76.9 .D343 D825 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:545590 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Joshi, R. C., author.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;QA76.9 .A25 J66 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:541852 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Tiller, James S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T55 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:544765 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Mena, Jesus., author.<br/>Preferred Shelf Number&#160;HV8073 .M395 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security patch management ent://SD_ILS/0/SD_ILS:542763 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Nicastro, Felicia M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Tibble, Ian., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Trinckes, John J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T75 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:539402 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Norman, Thomas L., author.<br/>Preferred Shelf Number&#160;HV8290 .N67 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:542078 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hinek, M. Jason., author.<br/>Preferred Shelf Number&#160;TK5102.94 .H56 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:545698 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Foreman, Park., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F656 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:545097 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;QA76.76 .D47 M466 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computer forensics and cyber crime : an introduction ent://SD_ILS/0/SD_ILS:134036 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Britz, Marjie.<br/>Preferred Shelf Number&#160;QA76.9.A25 B77 2009<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Profiling hackers : the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:545973 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Chiesa, Raoul, 1973, author.&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Preferred Shelf Number&#160;HV6773 .C477 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420086942">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:538962 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Talukder, Asoke K., author.&#160;Chaitanya, Manish.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T34 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security software development : assessing and managing security risks ent://SD_ILS/0/SD_ILS:543836 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Ashbaugh, Douglas A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A8246 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:544153 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Collette, Ronald D., author.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Preferred Shelf Number&#160;HF5548.37 .G462 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Brotby, W. Krag., author.<br/>Preferred Shelf Number&#160;HD30.2 .B78 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H52 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:539830 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Willett, Keith D., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 W5487 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Acquisti, Alessandro.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D528 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:540985 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Bacik, Sandy., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B335 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Brancik, Kenneth C., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B725 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Singhal, Anoop, 1958-<br/>Preferred Shelf Number&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:110682 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA76.9.A25 P45 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Grid computing security ent://SD_ILS/0/SD_ILS:248747 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Chakrabarti, Anirban.<br/>Preferred Shelf Number&#160;QA76.9.C58 C53 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:539940 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Todorov, Dobromir., author.<br/>Preferred Shelf Number&#160;TK5105.59 .T575 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data-driven block ciphers for fast telecommunication systems ent://SD_ILS/0/SD_ILS:546948 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Moldovyan, Nick., author.&#160;Moldovyan, Alex.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M664 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Software deployment, updating, and patching ent://SD_ILS/0/SD_ILS:544966 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Stackpole, Bill., author.&#160;Hanrion, Patrick.<br/>Preferred Shelf Number&#160;QA76.76 .C69 S74 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:546167 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Van der Linden, Maura A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 V359 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Chen, Hsinchun.<br/>Preferred Shelf Number&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Easttom, Chuck.<br/>Preferred Shelf Number&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:110865 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;QA76.9.A25 T83 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Linux Patch Management : keeping Linux systems up to date ent://SD_ILS/0/SD_ILS:119550 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J368 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Bilgi ve bilgisayar g&uuml;venli&#287;i : casus yaz&#305;l&#305;mlar ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:515469 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Canbek, G&uuml;rol.&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Preferred Shelf Number&#160;QA76.9.A25 C36 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The CISO handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:539204 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Gentile, Michael., author.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Preferred Shelf Number&#160;HF5548.37 .G46 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Tudor, Jan Killmeyer., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T83 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;TK5105.59 .E62 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Enhanced methods in computer security, biometric and artificial intelligence systems ent://SD_ILS/0/SD_ILS:109864 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Pejas, Jerzy, 1954-, ed.&#160;Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number&#160;QA76.9.A25 E545 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Curing the patch management headache ent://SD_ILS/0/SD_ILS:543815 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Nicastro, Felicia M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N526 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031294">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P427 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Codes : the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:546062 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M67 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 T47 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:544821 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Kairab, Sudhanshu., author.<br/>Preferred Shelf Number&#160;HF5548.32 .K345 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;McCumber, John, 1956, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M4284 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:267737 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Skoudis, Ed.&#160;Zeltser, Lenny.<br/>Preferred Shelf Number&#160;QA76.9.A25 S58 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> How to break software security : effective technigues for security testing ent://SD_ILS/0/SD_ILS:105584 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Whittaker, James A., 1965-&#160;Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 W48 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Hacking : Bili&#351;im korsanl&#305;&#287;&#305; ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:88578 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Y&#305;lmaz, Davut.<br/>Preferred Shelf Number&#160;TK 5105.59 Y56 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:96556 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Hoglund, Greg.&#160;McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 H635 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:104130 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;G&uuml;ven, Mehmet.<br/>Preferred Shelf Number&#160;QA 76.9.A25 G88 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security policies and procedures : a practitioner's reference ent://SD_ILS/0/SD_ILS:547228 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P428 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:541281 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Kipper, Gregory., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 K544 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Public key infrastructure : building trusted applications and Web services ent://SD_ILS/0/SD_ILS:543281 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P85 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> UMTS security ent://SD_ILS/0/SD_ILS:295861 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Niemi, Valtteri.&#160;Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a> Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a> John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:314021 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number&#160;QA76.9.A25 B56 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Caldwell, Wilma, ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:546817 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P46 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:544973 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Herrmann, Debra S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H47 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Technology and privacy : the new landscape ent://SD_ILS/0/SD_ILS:112999 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Agre, Philip.&#160;Rotenberg, Marc.<br/>Preferred Shelf Number&#160;QA76.9.A25 T43 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> GSM g&uuml;venlik mekanizmas&#305;n&#305;n incelenmesi ve geli&#351;tirilmesi ent://SD_ILS/0/SD_ILS:74236 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Kas&#305;m, Ba&#351;ar.<br/>Preferred Shelf Number&#160;TEZ/5165 K151 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:545821 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Held, Jonathan S., author.&#160;Bowers, John R.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H435 2001<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data privacy in the information age ent://SD_ILS/0/SD_ILS:135125 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Klosek, Jacqueline.<br/>Preferred Shelf Number&#160;QA76.9.A25 K57 2000<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:270164 2025-12-22T11:48:34Z 2025-12-22T11:48:34Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>