Search Results for 4. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d4.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2025-12-24T16:23:27Z RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:538754 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Paul, Goutam., author.&#160;Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number&#160;QA76.9 .A25 P385 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483447 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Mori, Paolo. editor. (orcid)0000-0002-6618-0388&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Camp, Olivier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Centered Computing 4th International Conference, HCC 2018, M&eacute;rida, Mexico, December, 5&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484032 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Tang, Yong. editor.&#160;Zu, Qiaohong. editor.&#160;Rodr&iacute;guez Garc&iacute;a, Jos&eacute; G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15127-0">https://doi.org/10.1007/978-3-030-15127-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems 15th European, Mediterranean, and Middle Eastern Conference, EMCIS 2018, Limassol, Cyprus, October 4-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486072 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Themistocleous, Marinos. editor. (orcid)0000-0002-6904-9692&#160;Rupino da Cunha, Paulo. editor. (orcid)0000-0003-2701-5248&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11395-7">https://doi.org/10.1007/978-3-030-11395-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Extraction Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486179 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Holzinger, Andreas. editor. (orcid)0000-0002-6786-5194&#160;Kieseberg, Peter. editor. (orcid)0000-0002-2847-2152&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29726-8">https://doi.org/10.1007/978-3-030-29726-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication Technologies for Vehicles 14th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, Colmar, France, May 16&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486397 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Hilt, Beno&icirc;t. editor.&#160;Berbineau, Marion. editor. (orcid)0000-0003-3807-9669&#160;Vinel, Alexey. editor.&#160;Jonsson, Magnus. editor.&#160;Pirovano, Alain. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25529-9">https://doi.org/10.1007/978-3-030-25529-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Geographical Information Systems Theory, Applications and Management 4th International Conference, GISTAM 2018, Funchal, Madeira, Portugal, March 17&ndash;19, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486645 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Ragia, Lemonia. editor.&#160;Grueau, C&eacute;dric. editor.&#160;Laurini, Robert. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29948-4">https://doi.org/10.1007/978-3-030-29948-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security Second International Conference, ML4CS 2019, Xi&rsquo;an, China, September 19-21, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484720 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Zhang, Jun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30619-9">https://doi.org/10.1007/978-3-030-30619-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:399285 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00006-6">https://doi.org/10.1007/978-3-030-00006-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400047 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Ganji, Mohadeseh. editor.&#160;Rashidi, Lida. editor.&#160;Fung, Benjamin C. M. editor. (orcid)0000-0001-8423-2906&#160;Wang, Can. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04503-6">https://doi.org/10.1007/978-3-030-04503-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402524 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Liu, Peng. editor.&#160;Mauw, Sjouke. editor.&#160;Stolen, Ketil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:402673 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Zhou, Jia. editor.&#160;Salvendy, Gavriel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92037-5">https://doi.org/10.1007/978-3-319-92037-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401734 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Infrastructures, Services, and IoT Systems for Smart Cities Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20&ndash;21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401875 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Longo, Antonella. editor.&#160;Zappatore, Marco. editor.&#160;Villari, Massimo. editor.&#160;Rana, Omer. editor.&#160;Bruneo, Dario. editor. (orcid)0000-0002-6080-9077<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67636-4">https://doi.org/10.1007/978-3-319-67636-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400541 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Manolopoulos, Yannis. editor. (orcid)0000-0003-4026-4329&#160;Hammer, Barbara. editor.&#160;Iliadis, Lazaros. editor.&#160;Maglogiannis, Ilias. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01421-6">https://doi.org/10.1007/978-3-030-01421-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 ent://SD_ILS/0/SD_ILS:400671 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Yang, Xin-She. editor.&#160;Nagar, Atulya K. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401491 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Hansen, Marit. editor.&#160;Kosta, Eleni. editor.&#160;Nai-Fovino, Igor. editor.&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image and Signal Processing 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401996 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Mansouri, Alamin. editor.&#160;El Moataz, Abderrahim. editor.&#160;Nouboud, Fathallah. editor.&#160;Mammass, Driss. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94211-7">https://doi.org/10.1007/978-3-319-94211-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399445 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Cremers, Cas. editor. (orcid)0000-0003-0322-2293&#160;Lehmann, Anja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part IV ent://SD_ILS/0/SD_ILS:399710 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:400071 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00012-7">https://doi.org/10.1007/978-3-030-00012-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400083 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Manolopoulos, Yannis. editor. (orcid)0000-0003-4026-4329&#160;Hammer, Barbara. editor.&#160;Iliadis, Lazaros. editor.&#160;Maglogiannis, Ilias. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01418-6">https://doi.org/10.1007/978-3-030-01418-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400341 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Zhou, Jia. editor.&#160;Salvendy, Gavriel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92034-4">https://doi.org/10.1007/978-3-319-92034-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:400367 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00009-7">https://doi.org/10.1007/978-3-030-00009-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:400514 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Manolopoulos, Yannis. editor. (orcid)0000-0003-4026-4329&#160;Hammer, Barbara. editor.&#160;Iliadis, Lazaros. editor.&#160;Maglogiannis, Ilias. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01424-7">https://doi.org/10.1007/978-3-030-01424-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400575 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Stoyanov, Danail. editor.&#160;Taylor, Zeike. editor.&#160;Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220&#160;Syeda-Mahmood, Tanveer. editor.&#160;Martel, Anne. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489055 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Teufel, Stephanie. editor.&#160;A Min, Tjoa. editor.&#160;You, Illsun. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489060 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Hansen, Marit. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Leenes, Ronald. editor.&#160;Whitehouse, Diane. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489000 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Villari, Massimo. editor.&#160;Zimmermann, Wolf. editor.&#160;Lau, Kung-Kiu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10&ndash;14, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:482971 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Brefeld, Ulf. editor.&#160;Curry, Edward. editor.&#160;Daly, Elizabeth. editor.&#160;MacNamee, Brian. editor. (orcid)0000-0003-2518-0274&#160;Marascu, Alice. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10997-4">https://doi.org/10.1007/978-3-030-10997-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Theoretical Neural Computation 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486229 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Karpov, Pavel. editor. (orcid)0000-0003-4786-9806&#160;Theis, Fabian. editor. (orcid)0000-0002-2419-1943&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30487-4">https://doi.org/10.1007/978-3-030-30487-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Processing Using Spark in Cloud ent://SD_ILS/0/SD_ILS:483400 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Mittal, Mamta. editor.&#160;Balas, Valentina E. editor.&#160;Goyal, Lalit Mohan. editor.&#160;Kumar, Raghvendra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0550-4">https://doi.org/10.1007/978-981-13-0550-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:483462 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Carlet, Claude. editor.&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534&#160;Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VLSI Design and Test for Systems Dependability ent://SD_ILS/0/SD_ILS:483711 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Asai, Shojiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-4-431-56594-9">https://doi.org/10.1007/978-4-431-56594-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2018 21st International Conference, Seoul, South Korea, November 28&ndash;30, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483841 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computer and Communication Networks 22nd International Conference, DCCN 2019, Moscow, Russia, September 23&ndash;27, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486659 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Vishnevskiy, Vladimir M. editor. (orcid)0000-0001-7373-4847&#160;Samouylov, Konstantin E. editor. (orcid)0000-0002-6368-9680&#160;Kozyrev, Dmitry V. editor. (orcid)0000-0003-0538-8430&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36625-4">https://doi.org/10.1007/978-3-030-36625-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3&ndash;5, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486956 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRICAI 2019: Trends in Artificial Intelligence 16th Pacific Rim International Conference on Artificial Intelligence, Cuvu, Yanuca Island, Fiji, August 26-30, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:486958 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Nayak, Abhaya C. editor. (orcid)0000-0003-0681-9570&#160;Sharma, Alok. editor. (orcid)0000-0002-7668-3501&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29894-4">https://doi.org/10.1007/978-3-030-29894-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Text and Time Series 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:486959 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Karpov, Pavel. editor. (orcid)0000-0003-4786-9806&#160;Theis, Fabian. editor. (orcid)0000-0002-2419-1943&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30490-4">https://doi.org/10.1007/978-3-030-30490-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484061 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890&#160;&#381;utautait&#279;, Inga. editor. (orcid)0000-0002-6073-2823&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cyber Security: Principles, Techniques, and Applications ent://SD_ILS/0/SD_ILS:484493 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Li, Kuan-Ching. editor.&#160;Chen, Xiaofeng. editor.&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6&ndash;11, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484523 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Nielson, Flemming. editor. (orcid)0000-0001-7362-6176&#160;Sands, David. editor. (orcid)0000-0001-6221-0503&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484914 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Yang, Qiang. editor.&#160;Zhou, Zhi-Hua. editor.&#160;Gong, Zhiguo. editor.&#160;Zhang, Min-Ling. editor.&#160;Huang, Sheng-Jun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16148-4">https://doi.org/10.1007/978-3-030-16148-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beyond Databases, Architectures and Structures. Paving the Road to Smart Data Processing and Analysis 15th International Conference, BDAS 2019, Ustro&#324;, Poland, May 28&ndash;31, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486837 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Kozielski, Stanis&#322;aw. editor.&#160;Mrozek, Dariusz. editor. (orcid)0000-0001-6764-6656&#160;Kasprowski, Pawe&#322;. editor. (orcid)0000-0002-2090-335X&#160;Ma&#322;ysiak-Mrozek, Bo&#380;ena. editor. (orcid)0000-0003-4977-4915&#160;Kostrzewa, Daniel. editor. (orcid)0000-0003-2781-3709<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-19093-4">https://doi.org/10.1007/978-3-030-19093-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Brain Inspired Cognitive Systems 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399295 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Ren, Jinchang. editor.&#160;Hussain, Amir. editor.&#160;Zheng, Jiangbin. editor.&#160;Liu, Cheng-Lin. editor.&#160;Luo, Bin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00563-4">https://doi.org/10.1007/978-3-030-00563-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399353 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Lahiri, Shuvendu K. editor.&#160;Wang, Chao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Visual Computing 13th International Symposium, ISVC 2018, Las Vegas, NV, USA, November 19 &ndash; 21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399922 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Bebis, George. editor.&#160;Boyle, Richard. editor.&#160;Parvin, Bahram. editor.&#160;Koracin, Darko. editor.&#160;Turek, Matt. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03801-4">https://doi.org/10.1007/978-3-030-03801-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Distributed Computing Systems 11th International Conference, IDCS 2018, Tokyo, Japan, October 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400103 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Xiang, Yang. editor.&#160;Sun, Jingtao. editor.&#160;Fortino, Giancarlo. editor.&#160;Guerrieri, Antonio. editor.&#160;Jung, Jason J. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02738-4">https://doi.org/10.1007/978-3-030-02738-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Information Security A Competency-Based Education Course ent://SD_ILS/0/SD_ILS:401941 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Alsmadi, Izzat. author.&#160;Burdwell, Robert. author.&#160;Aleroud&nbsp;, Ahmed. author.&#160;Wahbeh, Abdallah. author.&#160;Al-Qudah, Mahmoud. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:402214 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Phung, Dinh. editor.&#160;Tseng, Vincent S. editor.&#160;Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169&#160;Ho, Bao. editor.&#160;Ganji, Mohadeseh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93037-4">https://doi.org/10.1007/978-3-319-93037-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain &ndash; ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402216 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Chen, Shiping. editor. (orcid)0000-0002-4603-0024&#160;Wang, Harry. editor.&#160;Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:402493 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Amini, M. Hadi. editor.&#160;Boroojeni, Kianoosh G. editor.&#160;Iyengar, S.S. editor.&#160;Pardalos, Panos M. editor.&#160;Blaabjerg, Frede. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401312 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Baier, Christel. editor.&#160;Caires, Lu&iacute;s. editor. (orcid)0000-0002-3215-6734&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image and Video Technology PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401455 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Satoh, Shin'ichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92753-4">https://doi.org/10.1007/978-3-319-92753-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Edge Computing &ndash; EDGE 2018 Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401594 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Liu, Shijun. editor. (orcid)0000-0002-4108-1391&#160;Tekinerdogan, Bedir. editor. (orcid)0000-0002-8538-7261&#160;Aoyama, Mikio. editor.&#160;Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94340-4">https://doi.org/10.1007/978-3-319-94340-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Multimedia Information Processing &ndash; PCM 2017 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:401074 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Zeng, Bing. editor.&#160;Huang, Qingming. editor. (orcid)0000-0002-9247-2763&#160;El Saddik, Abdulmotaleb. editor.&#160;Li, Hongliang. editor.&#160;Jiang, Shuqiang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-77383-4">https://doi.org/10.1007/978-3-319-77383-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:401086 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Chaki, Rituparna. editor.&#160;Cortesi, Agostino. editor.&#160;Saeed, Khalid. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:401495 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Shi, Yong. editor.&#160;Fu, Haohuan. editor.&#160;Tian, Yingjie. editor.&#160;Krzhizhanovskaya, Valeria V. editor. (orcid)0000-0002-8247-129X&#160;Lees, Michael Harold. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93701-4">https://doi.org/10.1007/978-3-319-93701-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? ent://SD_ILS/0/SD_ILS:402451 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Lysne, Olav. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Data and Social Networks 7th International Conference, CSoNet 2018, Shanghai, China, December 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399097 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Chen, Xuemin. editor. (orcid)0000-0003-3820-9195&#160;Sen, Arunabha. editor.&#160;Li, Wei Wayne. editor.&#160;Thai, My T. editor. (orcid)0000-0003-0503-2012&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04648-4">https://doi.org/10.1007/978-3-030-04648-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399107 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Shi, Zhongzhi. editor.&#160;Mercier-Laurent, Eunika. editor.&#160;Li, Jiuyong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00828-4">https://doi.org/10.1007/978-3-030-00828-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:399121 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Ganapathi, Geetha. editor.&#160;Subramaniam, Arumugam. editor.&#160;Gra&ntilde;a, Manuel. editor.&#160;Balusamy, Suresh. editor.&#160;Natarajan, Rajamanickam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:400249 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Phung, Dinh. editor.&#160;Tseng, Vincent S. editor.&#160;Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169&#160;Ho, Bao. editor.&#160;Ganji, Mohadeseh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93040-4">https://doi.org/10.1007/978-3-319-93040-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400376 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Chen, Qingfeng. editor.&#160;Wu, Jia. editor.&#160;Zhang, Shichao. editor.&#160;Yuan, Changan. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Transformation: Challenges and Opportunities 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400416 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Cho, Wooje. editor.&#160;Fan, Ming. editor. (orcid)0000-0002-4303-5313&#160;Shaw, Michael J. editor.&#160;Yoo, Byungjoon. editor.&#160;Zhang, Han. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99936-4">https://doi.org/10.1007/978-3-319-99936-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber and electromagnetic threats in modern relay protection ent://SD_ILS/0/SD_ILS:543446 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Gurevich, Vladimir, 1956, author.<br/>Preferred Shelf Number&#160;TK2861 .G87 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482264326">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:543620 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M85 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Secure Smart Embedded Devices, Platforms and Applications ent://SD_ILS/0/SD_ILS:484765 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Markantonakis, Konstantinos. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Information Systems Engineering Workshops CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488707 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Iliadis, Lazaros. editor.&#160;Papazoglou, Michael. editor.&#160;Pohl, Klaus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07869-4">https://doi.org/10.1007/978-3-319-07869-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Continued Rise of the Cloud Advances and Trends in Cloud Computing ent://SD_ILS/0/SD_ILS:488899 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6452-4">https://doi.org/10.1007/978-1-4471-6452-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobility Data Management and Exploration ent://SD_ILS/0/SD_ILS:489503 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Pelekis, Nikos. author.&#160;Theodoridis, Yannis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-0392-4">https://doi.org/10.1007/978-1-4939-0392-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489506 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Atluri, Vijay. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:485543 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06811-4">https://doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485842 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Chen, Liqun. editor.&#160;Mitchell, Chris. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:487333 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Vasudevan, Amit. author.&#160;McCune, Jonathan M. author.&#160;Newsome, James. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488934 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Linawati. editor.&#160;Mahendra, Made Sudiana. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55032-4">https://doi.org/10.1007/978-3-642-55032-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Identity ent://SD_ILS/0/SD_ILS:484375 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;de Andrade, Norberto Nuno Gomes. author.&#160;Chen-Wilson, Lisha. author.&#160;Argles, David. author.&#160;Wills, Gary. author.&#160;Schiano di Zenise, Michele. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:488367 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:539725 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Preferred Shelf Number&#160;HD61.5 .L36 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:539726 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;DeFranco, Joanna F., author.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S7354 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:544118 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S734 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:545715 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Bahi, Jacques Mohcine., author.&#160;Guyeux, Christophe.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B344 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:544612 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Patil, Harsh Kupwade., author.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P38 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:547855 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;TK5105.59 .H3532 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:541429 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Doherty, Eamon P., author.<br/>Preferred Shelf Number&#160;HV8079 .C65 D64 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439898789">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;HD30.38 .B76 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;HV8290 .B34 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The 7 qualities of highly secure software ent://SD_ILS/0/SD_ILS:544951 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Paul, Mano., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P38 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439814475">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:545796 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Masud, Mehedy., author.&#160;Khan, Latifur.&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;QA76.9 .D343 M385 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:543119 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Macaulay, Tyson., author.&#160;Singer, Bryan.<br/>Preferred Shelf Number&#160;TS156.8 .M328 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:544765 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Mena, Jesus., author.<br/>Preferred Shelf Number&#160;HV8073 .M395 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:539761 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Liu, Lei, 1968, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 L587 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the ISSMP CBK ent://SD_ILS/0/SD_ILS:544375 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;QA76.9 .A25 O34 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:545590 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Joshi, R. C., author.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;QA76.9 .A25 J66 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Tibble, Ian., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:540614 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Dua, Sumeet., author.&#160;Du, Xian.<br/>Preferred Shelf Number&#160;QA76.9 .D343 D825 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Paul, Mano., author.<br/>Preferred Shelf Number&#160;QA76.76 .D47 P3775 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:541852 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Tiller, James S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T55 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security patch management ent://SD_ILS/0/SD_ILS:542763 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Nicastro, Felicia M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Trinckes, John J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T75 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:542078 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Hinek, M. Jason., author.<br/>Preferred Shelf Number&#160;TK5102.94 .H56 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420075199">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:545097 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;QA76.76 .D47 M466 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826973">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:545698 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Foreman, Park., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F656 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:538962 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Talukder, Asoke K., author.&#160;Chaitanya, Manish.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T34 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cyber fraud : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:540157 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Graham, James.&#160;Howard, Rick.<br/>Preferred Shelf Number&#160;HV6773 .H69 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420091281">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security software development : assessing and managing security risks ent://SD_ILS/0/SD_ILS:543836 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Ashbaugh, Douglas A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A8246 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:544153 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Collette, Ronald D., author.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Preferred Shelf Number&#160;HF5548.37 .G462 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H52 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Brotby, W. Krag., author.<br/>Preferred Shelf Number&#160;HD30.2 .B78 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:539830 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Willett, Keith D., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 W5487 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:544396 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Brancik, Kenneth C., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B725 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420046601">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:540985 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Bacik, Sandy., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B335 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Acquisti, Alessandro.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D528 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:539940 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Todorov, Dobromir., author.<br/>Preferred Shelf Number&#160;TK5105.59 .T575 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Software deployment, updating, and patching ent://SD_ILS/0/SD_ILS:544966 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Stackpole, Bill., author.&#160;Hanrion, Patrick.<br/>Preferred Shelf Number&#160;QA76.76 .C69 S74 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013290">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:546167 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Van der Linden, Maura A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 V359 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data-driven block ciphers for fast telecommunication systems ent://SD_ILS/0/SD_ILS:546948 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Moldovyan, Nick., author.&#160;Moldovyan, Alex.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M664 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420054125">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;TK5105.59 .E62 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The CISO handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:539204 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Gentile, Michael., author.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Preferred Shelf Number&#160;HF5548.37 .G46 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:541238 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Tudor, Jan Killmeyer., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T83 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203488751">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 T47 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;McCumber, John, 1956, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M4284 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:544821 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Kairab, Sudhanshu., author.<br/>Preferred Shelf Number&#160;HF5548.32 .K345 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Curing the patch management headache ent://SD_ILS/0/SD_ILS:543815 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Nicastro, Felicia M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N526 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031294">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P427 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Codes : the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:546062 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M67 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security policies and procedures : a practitioner's reference ent://SD_ILS/0/SD_ILS:547228 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P428 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:541281 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Kipper, Gregory., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 K544 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203504765">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Public key infrastructure : building trusted applications and Web services ent://SD_ILS/0/SD_ILS:543281 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P85 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> UMTS security ent://SD_ILS/0/SD_ILS:295861 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Niemi, Valtteri.&#160;Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a> Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a> John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:544973 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Herrmann, Debra S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H47 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:546817 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P46 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> GSM g&uuml;venlik mekanizmas&#305;n&#305;n incelenmesi ve geli&#351;tirilmesi ent://SD_ILS/0/SD_ILS:74236 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Kas&#305;m, Ba&#351;ar.<br/>Preferred Shelf Number&#160;TEZ/5165 K151 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:545821 2025-12-24T16:23:27Z 2025-12-24T16:23:27Z Author&#160;Held, Jonathan S., author.&#160;Bowers, John R.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H435 2001<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>