Search Results for Business. - Narrowed by: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dBusiness.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026te$003dILS$0026ps$003d300?2024-11-12T03:26:16ZOnline Business Security Systemsent://SD_ILS/0/SD_ILS:1666412024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Williams, Godfried B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security and its impact on business strategyent://SD_ILS/0/SD_ILS:4822132024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conferenceent://SD_ILS/0/SD_ILS:3352922024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335292.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1976362024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Obaidat, Mohammad S. editor. Sevillano, José L. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesseent://SD_ILS/0/SD_ILS:1949662024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Verclas, Stephan. editor. Linnhoff-Popien, Claudia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22259-7">http://dx.doi.org/10.1007/978-3-642-22259-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1972022024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Fischer-Hübner, Simone. editor. Katsikas, Sokratis. editor. Quirchmayr, Gerald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32287-7">http://dx.doi.org/10.1007/978-3-642-32287-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Business System Management and Engineering From Open Issues to Applicationsent://SD_ILS/0/SD_ILS:1972182024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Ardagna, Claudio A. editor. Damiani, Ernesto. editor. Maciaszek, Leszek A. editor. Missikoff, Michele. editor. Parkin, Michael. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32439-0">http://dx.doi.org/10.1007/978-3-642-32439-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)ent://SD_ILS/0/SD_ILS:1989532024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conferenceent://SD_ILS/0/SD_ILS:1998912024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conferenceent://SD_ILS/0/SD_ILS:1994832024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conferenceent://SD_ILS/0/SD_ILS:1994112024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9283-6">http://dx.doi.org/10.1007/978-3-8348-9283-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1890982024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88653-2">http://dx.doi.org/10.1007/978-3-540-88653-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy and Security in Digital Business 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1907252024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Fischer-Hübner, Simone. editor. Lambrinoudakis, Costas. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03748-1">http://dx.doi.org/10.1007/978-3-642-03748-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japanent://SD_ILS/0/SD_ILS:1677882024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Oya, Makoto. editor. Uda, Ryuya. editor. Yasunobu, Chizuko. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1887652024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Furnell, Steven. editor. Katsikas, Sokratis K. editor. Lioy, Antonio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papersent://SD_ILS/0/SD_ILS:1860342024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1871462024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Lambrinoudakis, Costas. editor. Pernul, Günther. editor. Tjoa, A Min. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papersent://SD_ILS/0/SD_ILS:1875552024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Filipe, Joaquim. editor. Coelhas, Helder. editor. Saramago, Monica. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Systems: Research, Development, Applications, Education 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4870382024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Wrycza, Stanisław. editor. (orcid)0000-0001-7699-6631 Maślankowski, Jacek. editor. (orcid)0000-0003-0357-2736 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29608-7">https://doi.org/10.1007/978-3-030-29608-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3996942024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Tjoa, A Min. editor. (orcid)0000-0002-8295-9252 Raffai, Maria. editor. (orcid)0000-0001-6934-6366 Doucek, Petr. editor. (orcid)0000-0002-5647-661X Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Evaluation of Electronic Voting Requirements and Evaluation Procedures to Support Responsible Election Authoritiesent://SD_ILS/0/SD_ILS:1900782024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Volkamer, Melanie. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01662-2">http://dx.doi.org/10.1007/978-3-642-01662-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:2899952024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Scholz, James A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439841600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Total information risk management maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:3066932024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Borek, Alexander.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papersent://SD_ILS/0/SD_ILS:3340782024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Pietro, Roberto. editor. Herranz, Javier. editor. Damiani, Ernesto. editor. State, Radu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334078.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347602024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Rieck, Konrad. editor. Stewin, Patrick. editor. Seifert, Jean-Pierre. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334760.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347862024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334786.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349582024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Preferred Shelf Number ONLINE(334958.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Computing and Communications International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349722024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Thampi, Sabu M. editor. Atrey, Pradeep K. editor. Fan, Chun-I. editor. Perez, Gregorio Martinez. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334972.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40576-1">http://dx.doi.org/10.1007/978-3-642-40576-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350772024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Susilo, Willy. editor. Reyhanitabar, Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335077.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3352252024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Su, Jinshu. editor. Zhao, Baokang. editor. Sun, Zhigang. editor. Wang, Xiaofeng. editor. Wang, Fei. editor.<br/>Preferred Shelf Number ONLINE(335225.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3341842024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Kurosawa, Kaoru. editor. Hanaoka, Goichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334184.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enterprise Identity Management Towards an Investment Decision Support Approachent://SD_ILS/0/SD_ILS:3339232024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Royer, Denis. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333923.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3343052024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Basin, David. editor. Mitchell, John C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334305.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3341222024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Dawson, Ed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334122.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3341322024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Hoepman, Jaap-Henk. editor. Verbauwhede, Ingrid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334132.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3344032024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Flegel, Ulrich. editor. Markatos, Evangelos. editor. Robertson, William. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334403.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3346382024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Lopez, Javier. editor. Huang, Xinyi. editor. Sandhu, Ravi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334638.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3347202024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334720.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3348632024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334863.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital Forensics and Cyber Crime 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:3348642024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Rogers, Marcus. editor. Seigfried-Spellar, Kathryn C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334864.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39891-9">http://dx.doi.org/10.1007/978-3-642-39891-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349092024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Service-Oriented and Cloud Computing Second European Conference, ESOCC 2013, Málaga, Spain, September 11-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349832024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Lau, Kung-Kiu. editor. Lamersdorf, Winfried. editor. Pimentel, Ernesto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334983.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40651-5">http://dx.doi.org/10.1007/978-3-642-40651-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Public Key Infrastructuresent://SD_ILS/0/SD_ILS:3349842024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Buchmann, Johannes A. author. Karatsiolis, Evangelos. author. Wiesmaier, Alexander. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334984.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350022024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Decker, Bart. editor. Dittmann, Jana. editor. Kraetzer, Christian. editor. Vielhauer, Claus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335002.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Research in Attacks, Intrusions, and Defenses 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350852024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Stolfo, Salvatore J. editor. Stavrou, Angelos. editor. Wright, Charles V. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335085.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41284-4">http://dx.doi.org/10.1007/978-3-642-41284-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3350882024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Adams, Andrew A. editor. Brenner, Michael. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335088.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Radio Frequency Identification Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:3350902024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Hutter, Michael. editor. Schmidt, Jörn-Marc. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335090.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41332-2">http://dx.doi.org/10.1007/978-3-642-41332-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Modern Cryptography Primer Theoretical Foundations and Practical Applicationsent://SD_ILS/0/SD_ILS:3350992024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Kościelny, Czesław. author. Kurkowski, Mirosław. author. Srebrny, Marian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335099.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Tibble, Ian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Stackpole, Bill. Oksendahl, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2888902024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Landoll, Douglas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Ventre, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Willett, Keith D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Layton, Timothy P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2847902024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Landoll, Douglas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-11-12T03:26:16Z2024-11-12T03:26:16ZAuthor Kairab, Sudhanshu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>