Search Results for Analysis. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAnalysis.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300? 2026-02-19T13:24:46Z Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Clark, Champ, III.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:538713 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:544821 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Perceptions and Analysis of Digital Risks ent://SD_ILS/0/SD_ILS:597226 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Capelle, Camille.&#160;Liqu&egrave;te, Vincent.<br/>Preferred Shelf Number&#160;QA76.575<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:539402 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Norman, Thomas L., author.<br/>Preferred Shelf Number&#160;HV8290 .N67 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:112211 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Carvey, Harlan A.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:145678 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Carvey, Harlan A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Core Data Analysis: Summarization, Correlation, and Visualization ent://SD_ILS/0/SD_ILS:486081 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Mirkin, Boris. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00271-8">https://doi.org/10.1007/978-3-030-00271-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:458869 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Bradley, Jaron, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:112202 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Maynor, David.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:148488 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Maynor, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fusion of artificial intelligence and machine learning in advanced image processing, data analysis, and cyber security ent://SD_ILS/0/SD_ILS:581353 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Rana, Arun Kumar, editor.<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003493570">https://www.taylorfrancis.com/books/9781003493570</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ATTACK-AND-DEFENSE GAMES FOR CONTROL SYSTEMS analysis and synthesis. ent://SD_ILS/0/SD_ILS:576456 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Yuan, Huanhuan.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003483250">https://www.taylorfrancis.com/books/9781003483250</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next Generation and Advanced Network Reliability Analysis Using Markov Models and Software Reliability Engineering ent://SD_ILS/0/SD_ILS:485213 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Ali, Syed Riffat. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01647-0">https://doi.org/10.1007/978-3-030-01647-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3&ndash;5, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485759 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Polian, Ilia. editor. (orcid)0000-0002-6563-2725&#160;St&ouml;ttinger, Marc. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16350-1">https://doi.org/10.1007/978-3-030-16350-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beyond Databases, Architectures and Structures. Paving the Road to Smart Data Processing and Analysis 15th International Conference, BDAS 2019, Ustro&#324;, Poland, May 28&ndash;31, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486837 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Kozielski, Stanis&#322;aw. editor.&#160;Mrozek, Dariusz. editor. (orcid)0000-0001-6764-6656&#160;Kasprowski, Pawe&#322;. editor. (orcid)0000-0002-2090-335X&#160;Ma&#322;ysiak-Mrozek, Bo&#380;ena. editor. (orcid)0000-0003-4977-4915&#160;Kostrzewa, Daniel. editor. (orcid)0000-0003-2781-3709<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-19093-4">https://doi.org/10.1007/978-3-030-19093-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> High-Performance Computing and Big Data Analysis Second International Congress, TopHPC 2019, Tehran, Iran, April 23&ndash;25, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486938 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Grandinetti, Lucio. editor.&#160;Mirtaheri, Seyedeh Leili. editor.&#160;Shahbazian, Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-33495-6">https://doi.org/10.1007/978-3-030-33495-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Analysis of Images and Patterns 18th International Conference, CAIP 2019, Salerno, Italy, September 3&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483876 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Vento, Mario. editor. (orcid)0000-0002-2948-741X&#160;Percannella, Gennaro. editor. (orcid)0000-0002-1227-0353&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29891-3">https://doi.org/10.1007/978-3-030-29891-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Digital Forensic Data Volume 2: Quick Analysis for Evidence and Intelligence ent://SD_ILS/0/SD_ILS:399251 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Quick, Darren. author.&#160;Choo, Kim-Kwang Raymond. author. (orcid)0000-0001-9208-5336&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0263-3">https://doi.org/10.1007/978-981-13-0263-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400575 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Stoyanov, Danail. editor.&#160;Taylor, Zeike. editor.&#160;Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220&#160;Syeda-Mahmood, Tanveer. editor.&#160;Martel, Anne. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400637 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Fan, Junfeng. editor.&#160;Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image Analysis and Recognition 15th International Conference, ICIAR 2018, P&oacute;voa de Varzim, Portugal, June 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401604 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Campilho, Aur&eacute;lio. editor.&#160;Karray, Fakhri. editor. (orcid)0000-0002-4217-1372&#160;ter Haar Romeny, Bart. editor. (orcid)0000-0003-3442-3207&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399353 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Lahiri, Shuvendu K. editor.&#160;Wang, Chao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approach ent://SD_ILS/0/SD_ILS:400393 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Parkinson, Simon. editor. (orcid)0000-0002-1747-9914&#160;Crampton, Andrew. editor. (orcid)0000-0002-4635-9102&#160;Hill, Richard. editor. (orcid)0000-0003-0105-7730&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 22nd Iberoamerican Congress, CIARP 2017, Valpara&iacute;so, Chile, November 7&ndash;10, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400520 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Mendoza, Marcelo. editor. (orcid)0000-0002-7969-6041&#160;Velast&iacute;n, Sergio. editor. (orcid)0000-0001-6775-7137&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75193-1">https://doi.org/10.1007/978-3-319-75193-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Griffor, Edward R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Threat forecasting : leveraging big data for predictive analysis ent://SD_ILS/0/SD_ILS:458886 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Pirc, John, author.&#160;DeSanto, David, author.&#160;Davison, Iain, author.&#160;Gragido, Will, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128000069">https://www.sciencedirect.com/science/book/9780128000069</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:458777 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488920 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE(355909.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:145689 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Carvey, Harlan A.&#160;Kolde, Jennifer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:145659 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Carvey, Harlan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:296665 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Ye, Nong.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F5334 2000<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:545715 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Bahi, Jacques Mohcine., author.&#160;Guyeux, Christophe.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B344 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Preferred Shelf Number&#160;QA76.9 .A25 E44 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P76 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The DevSecOps playbook : deliver continuous security at speed ent://SD_ILS/0/SD_ILS:598634 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Mack, Sean D., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M33 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> BLOCKCHAIN AND DIGITAL TWIN ENABLED IOT NETWORKS privacy and security. ent://SD_ILS/0/SD_ILS:569607 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Kumar, Randhir.&#160;Kumar, Prabhat.&#160;C C, Sobin.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003403791">https://www.taylorfrancis.com/books/9781003403791</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A98 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> System Reliability and Security Techniques and Methodologies. ent://SD_ILS/0/SD_ILS:576623 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Iqbal, Javaid.&#160;Masoodi, Faheem Syeed.&#160;Ahmad Malik, Ishfaq.&#160;Khurshid, Shozab.&#160;Saraf, Iqra.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032624983">https://www.taylorfrancis.com/books/9781032624983</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing secure systems. ent://SD_ILS/0/SD_ILS:565417 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Melone, Michael, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M45 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003144182">https://www.taylorfrancis.com/books/9781003144182</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure data science : integrating cyber security and data science ent://SD_ILS/0/SD_ILS:574976 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Thuraisingham, Bhavani M., author.&#160;Kantarcioglu, Murat, author.&#160;Khan, Latifur, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003081845">https://www.taylorfrancis.com/books/9781003081845</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing cybersecurity in the process industries ent://SD_ILS/0/SD_ILS:597508 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Preferred Shelf Number&#160;TP155.7<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> You can stop stupid : stopping losses from accidental and malicious actions ent://SD_ILS/0/SD_ILS:596502 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Winkler, Ira, author.&#160;Brown, Tracy Celaya, author.<br/>Preferred Shelf Number&#160;HD61.5 .W55 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical AI for Cybersecurity ent://SD_ILS/0/SD_ILS:574909 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003005230">https://www.taylorfrancis.com/books/9781003005230</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Anson, Steve.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in humanities and social sciences : a research methods approach ent://SD_ILS/0/SD_ILS:596373 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Loiseau, Hugo, editor.&#160;Ventre, Daniel, editor.&#160;Aden, Hartmut, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNS security management ent://SD_ILS/0/SD_ILS:593802 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Dooley, Michael, 1962- author.&#160;Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:594756 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Brooks, Charles J., author.&#160;Grow, Christopher, author.&#160;Craig, Philip, author.&#160;Short, Donald, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:543620 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M85 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S7354 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:538754 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Paul, Goutam., author.&#160;Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number&#160;QA76.9 .A25 P385 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:544765 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Mena, Jesus., author.<br/>Preferred Shelf Number&#160;HV8073 .M395 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:545698 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Foreman, Park., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F656 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Digital privacy : theory, technologies, and practices ent://SD_ILS/0/SD_ILS:547774 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Acquisti, Alessandro.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D528 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;TK5105.59 .E62 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:542250 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;McCumber, John, 1956, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M4284 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:545226 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Peltier, Thomas R., author.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P427 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2026-02-19T13:24:46Z 2026-02-19T13:24:46Z Author&#160;Kairab, Sudhanshu., author.<br/>Preferred Shelf Number&#160;HF5548.32 .K345 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>