Search Results for Computer Security - Narrowed by: Wiley E-Book Collection SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AWILEY$002509Wiley$002bE-Book$002bCollection$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-01-22T20:15:49Z Computer network security ent://SD_ILS/0/SD_ILS:595830 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Sadiqui, Ali.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:597739 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Z35 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematics for the Digital Systems Engineer Essentials for Modern Cryptography, Computer Security and Communications Technology. ent://SD_ILS/0/SD_ILS:600431 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mitchell, Chris J.<br/>Preferred Shelf Number&#160;XX(600431.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R438 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography. 1 ent://SD_ILS/0/SD_ILS:599697 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael.&#160;Rivain, Mattieu.&#160;O'Flynn, Colin.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Cryptography. 3 ent://SD_ILS/0/SD_ILS:599815 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 2 : Cryptanalysis and future directions ent://SD_ILS/0/SD_ILS:598806 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H53 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asymmetric cryptography : primitives and protocols ent://SD_ILS/0/SD_ILS:598096 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Pointcheval, David, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A83 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building effective privacy programs : cybersecurity from principles to practice ent://SD_ILS/0/SD_ILS:600111 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .P735 E34 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defense in depth : modern cybersecurity strategies and evolving threats ent://SD_ILS/0/SD_ILS:600191 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Zangana, Hewa Majeed, 1987- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Wiley handbook of art therapy ent://SD_ILS/0/SD_ILS:600264 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Gussak, David, editor.&#160;Rosal, Marcia L., editor.<br/>Preferred Shelf Number&#160;RC489 .A7 W55 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safeguarding satellite communications : issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:600245 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;An, Jianpin, author.<br/>Preferred Shelf Number&#160;TK5104 .A53 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital immune system : principles and practices ent://SD_ILS/0/SD_ILS:600243 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Priyambada Dash, Sujata, editor.&#160;Mishra, Vaibhav.&#160;Shaw, Bijeta.&#160;Panda, Sandeep Kumar.&#160;Balamurugan, S.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D54 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI security : defense, threats, and vulnerabilities ent://SD_ILS/0/SD_ILS:600294 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Rana, Shaila, author.&#160;Chicone, Rhonda, author.<br/>Preferred Shelf Number&#160;Q335 .R36 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep learning for intrusion detection : techniques and applications ent://SD_ILS/0/SD_ILS:600319 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Masoodi, Faheem Syeed, editor.&#160;Bamhdi, Alwi, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer memories 1 : core concepts ent://SD_ILS/0/SD_ILS:600350 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Darche, Philippe, author.<br/>Preferred Shelf Number&#160;TK7895 .M4 D37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Preferred Shelf Number&#160;QA76.9 .A25 E44 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reinforcement learning for cyber operations : applications of artificial intelligence for penetration testing ent://SD_ILS/0/SD_ILS:599600 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Rahman, Abdul (Executive), author.<br/>Preferred Shelf Number&#160;Q325.6 .R34 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394206483">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394206483</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Preferred Shelf Number&#160;QA76.9 .C65 N38 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Janca, Tanya. author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Edge of intelligence : exploring the frontiers of AI at the edge ent://SD_ILS/0/SD_ILS:599759 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mahajan, Shubham, editor.&#160;Munirathinam, Sathyan, editor.&#160;Raj, Pethuru, editor.<br/>Preferred Shelf Number&#160;Q335 .E34 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Time-Sensitive Systems. ent://SD_ILS/0/SD_ILS:599899 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Choudhury, Tanupriy.&#160;Choudhury, Tanupriya/Singh, Rahul Kuma.&#160;Tomar, Ravi.<br/>Preferred Shelf Number&#160;TA168<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimizing biofuel production with artificial intelligence ent://SD_ILS/0/SD_ILS:599901 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Kuila, Arindam, editor.&#160;Kumar, Depak, editor.<br/>Preferred Shelf Number&#160;TP339 .O68 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Rise of the machines : when AI and zero trust collide : a Project Zero Trust story ent://SD_ILS/0/SD_ILS:599932 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Finney, George, author.&#160;Vinduska, Zach, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F56 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISA certified information systems auditor practice tests : covers 2024-2025 exam objectives ent://SD_ILS/0/SD_ILS:599955 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Grego, Peter H., author.&#160;Chapple, Mike, author.<br/>Preferred Shelf Number&#160;QA76.3 .G74 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394324460">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394324460</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber recon : my life in cyber espionage and ransomware negotiation ent://SD_ILS/0/SD_ILS:600081 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Minder, Kurtis, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M56 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security ent://SD_ILS/0/SD_ILS:599222 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Brooks, Chuck (Writer of Inside cyber), author.<br/>Preferred Shelf Number&#160;HC79 .T4 B735 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice ent://SD_ILS/0/SD_ILS:599377 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Edwards, Jason (Cybersecurity expert), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The impact of algorithmic technologies on healthcare ent://SD_ILS/0/SD_ILS:599726 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Dubey, Parul, editor&#160;Madankar, Mangala, editor&#160;Dubey, Pushkar, editor&#160;Hung, Bui Thanh, editor<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the digital frontier : threats and advanced techniques in security and forensics ent://SD_ILS/0/SD_ILS:599732 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Sharma, Kavita, 1985- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and cybersecurity in healthcare ent://SD_ILS/0/SD_ILS:599741 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Agrawal, Rashmi, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78 A78 2025 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Taming the hacking storm : a framework for securing and defending networks ent://SD_ILS/0/SD_ILS:599858 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P76 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Edwards, Jason, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing cyber-physical systems : fundamentals, applications and challenges ent://SD_ILS/0/SD_ILS:600260 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Ananthajothi, K., editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Preferred Shelf Number&#160;TK3001 .M37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication networks in smart power grids ent://SD_ILS/0/SD_ILS:599871 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Zhou, Boyang, author.<br/>Preferred Shelf Number&#160;TK3105 .Z46 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-based advanced optimization techniques for edge computing ent://SD_ILS/0/SD_ILS:599834 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mohit, Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.583 .A33 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287062">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287062</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Metaverse communication and computing networks : applications, technologies, and approaches ent://SD_ILS/0/SD_ILS:598545 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Hoang, Dinh Thai, 1986- editor.&#160;Nguyen, Diep N., editor.&#160;Nguyen, Cong T., editor.&#160;Hossain, Ekram, 1971- editor.&#160;Niyato, Dusit, editor.<br/>Preferred Shelf Number&#160;TK5105.8864 .M58 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394160013">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394160013</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The DevSecOps playbook : deliver continuous security at speed ent://SD_ILS/0/SD_ILS:598634 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mack, Sean D., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M33 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conversational artificial intelligence ent://SD_ILS/0/SD_ILS:598905 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Rawat, Romil, 1986- editor.&#160;Chakrawarti, Rajesh Kumar, editor&#160;Sarangi, Sanjaya Kumar, editor&#160;Vyas, Piyush, editor&#160;Alamanda, Mary Sowjanya, editor<br/>Preferred Shelf Number&#160;Q335 .C66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> x86 software reverse-engineering, cracking, and counter-measures ent://SD_ILS/0/SD_ILS:598920 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Domas, Stephanie, author.&#160;Domas, Christopher, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D66 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applying artificial intelligence in cyber security analytics and cyber threat detection ent://SD_ILS/0/SD_ILS:599037 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mahajan, Shilpa, editor.&#160;Khurana, Mehak, editor.&#160;Estrela, Vania Vieira, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A674 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394196470">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394196470</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning applications : from computer vision to robotics ent://SD_ILS/0/SD_ILS:598690 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chatterjee, Indranath, editor.&#160;Zalte, Sheetal S., editor.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;Q325.5 .M321323 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394173358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394173358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Federated learning for future intelligent wireless networks ent://SD_ILS/0/SD_ILS:598767 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Sun, Yao, editor.<br/>Preferred Shelf Number&#160;Q325.5 .F43 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119913924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119913924</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy preservation of genomic and medical data ent://SD_ILS/0/SD_ILS:598731 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;R859.7 .S43 P75 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213726">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213726</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A98 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart edge computing : an operation research perspective ent://SD_ILS/0/SD_ILS:598978 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chakraborty, Rajdeep, editor.&#160;Ghosh, Anupam, editor.&#160;Mandal, Jyotsna Kumar, editor.&#160;Choudhury, Tanupriya, editor.&#160;Chatterjee, Prasenjit, editor.<br/>Preferred Shelf Number&#160;QA76.583<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fog computing for intelligent cloud IoT systems ent://SD_ILS/0/SD_ILS:599191 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Banerjee, Chandan, editor.&#160;Ghosh, Anupam, editor.&#160;Chakraborty, Rajdeep, editor.&#160;Elngar, Ahmed A., editor.<br/>Preferred Shelf Number&#160;TK5105.8857 .F64 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stepping through cybersecurity risk management : a systems thinking approach ent://SD_ILS/0/SD_ILS:599021 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Bayuk, Jennifer L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B39 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Realizing the Metaverse : a communications and networking perspective ent://SD_ILS/0/SD_ILS:599057 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Lim, Wei Yang Bryan, editor.&#160;Xiong, Zehui, editor.&#160;Niyato, Dusit, editor.&#160;Zhang, Junshan (Electrical engineer), editor.&#160;Shen, X. (Xuemin), 1958- editor.<br/>Preferred Shelf Number&#160;TK5105.8864 .R43 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity guide to governance, risk, and compliance ent://SD_ILS/0/SD_ILS:598945 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.<br/>Preferred Shelf Number&#160;HD30.38 .E34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cyber intelligence : a hands-on guide to digital forensics ent://SD_ILS/0/SD_ILS:599262 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 J633 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrating metaheuristics in computer vision for real-world optimization problems ent://SD_ILS/0/SD_ILS:599305 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Preferred Shelf Number&#160;TA1637 .I58 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230952">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230952</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT-enabled unobtrusive surveillance systems for smart campus safety ent://SD_ILS/0/SD_ILS:597903 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Anagnostopoulos, Theodoros, author.<br/>Preferred Shelf Number&#160;LB2866<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119903932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119903932</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in intelligent networking systems ent://SD_ILS/0/SD_ILS:597809 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Xu, Shengjie (Professor), author.&#160;Qian, Yi, 1962- author.&#160;Hu, Rose Qingyang, author.<br/>Preferred Shelf Number&#160;TK5105.59 .X8 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine intelligence, big data analytics, and IoT in image processing : practical applications ent://SD_ILS/0/SD_ILS:598220 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Preferred Shelf Number&#160;Q325.5 .M33 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data exfiltration threats and prevention techniques : machine learning and memory-based data security ent://SD_ILS/0/SD_ILS:598245 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tari, Zahir, 1961- author.&#160;Sohrabi, Nasrin, 1982- author.&#160;Samadi, Yasaman, 1993- author.&#160;Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number&#160;TK5105.59 .T365 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless communication in cyber security ent://SD_ILS/0/SD_ILS:598705 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Sountharrajan, S. editor&#160;Maheswar, R. editor&#160;Rathee, Geetanjali, editor&#160;Akila, M. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25 W57 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security technologies and social implications ent://SD_ILS/0/SD_ILS:597740 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Markarian, Garik, editor.&#160;Karlovic, Ru&#382;a, editor.&#160;Nitsch, Holger, editor.&#160;Chandramouli, Krishna, editor.<br/>Preferred Shelf Number&#160;HV7936 .A8 S39 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainably investing in digital assets globally ent://SD_ILS/0/SD_ILS:597764 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Ozelli, Selva, author.<br/>Preferred Shelf Number&#160;HG4515.15 .O38 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Evolving networking technologies : developments and future directions ent://SD_ILS/0/SD_ILS:598339 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Gupta, Shaurya, editor.<br/>Preferred Shelf Number&#160;TK5105.5 .E96 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime during the SARS-CoV-2 pandemic (2019-2022) ent://SD_ILS/0/SD_ILS:598517 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Ventre, Daniel, editor.&#160;Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number&#160;HV6773 .C93 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber investigations : a research based textbook for advanced studies ent://SD_ILS/0/SD_ILS:597931 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Preferred Shelf Number&#160;HV8079 .C65 C933 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing delay-tolerant networks with BPSec ent://SD_ILS/0/SD_ILS:598174 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Birrane, Edward J., author.&#160;Heiner, Sarah, author.&#160;McKeever, Ken, author.<br/>Preferred Shelf Number&#160;TK5105.59 .B48 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119823513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119823513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI and machine learning for network and security management ent://SD_ILS/0/SD_ILS:598294 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Wu, Yulei, author.&#160;Ge, Jingguo, author.&#160;Li, Tong, author.<br/>Preferred Shelf Number&#160;Q335 .W8 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Corporate cybersecurity : identifying risks and the bug bounty program ent://SD_ILS/0/SD_ILS:596785 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Jackson, John (Cybersecurity professional), author.<br/>Preferred Shelf Number&#160;HD30.38 .J34 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and local government ent://SD_ILS/0/SD_ILS:597392 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Norris, Donald F., author.&#160;Mateczun, Laura, author.&#160;Forno, Richard, author.<br/>Preferred Shelf Number&#160;JS331 .N67 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing cybersecurity in the process industries ent://SD_ILS/0/SD_ILS:597508 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Preferred Shelf Number&#160;TP155.7<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The digital agricultural revolution : innovations and challenges in agriculture through technology disruptions ent://SD_ILS/0/SD_ILS:597521 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Bhatnagar, Roheet, editor.&#160;Tripathi, Nitin Kumar, editor.&#160;Bhatnagar, Nitu, editor.&#160;Panda, Chandan Kumar, editor.<br/>Preferred Shelf Number&#160;S494.5 .I5 D54 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119823469">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119823469</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security. 1, Authentication and data hiding ent://SD_ILS/0/SD_ILS:597454 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Puech, William, editor.<br/>Preferred Shelf Number&#160;QA76.575<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119901808">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119901808</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tools, languages, methodologies for representing semantics on the web of things ent://SD_ILS/0/SD_ILS:597905 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mehta, Shikha, editor.<br/>Preferred Shelf Number&#160;TK1505.88815<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394171460">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394171460</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework ent://SD_ILS/0/SD_ILS:597029 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Brumfield, Cynthia, author.&#160;Haugli, Brian, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B82 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119816348">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119816348</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO evolution : business knowledge for cybersecurity executives ent://SD_ILS/0/SD_ILS:597056 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Sharp, Matthew K., author.&#160;Lambros, Kyriakos P., author.<br/>Preferred Shelf Number&#160;HD30.2 .S5325 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Power system protection ent://SD_ILS/0/SD_ILS:597296 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Anderson, Paul M., author.&#160;Henville, Charles, author.&#160;Rifaat, Rasheek, author.&#160;Johnson, Brian, author.&#160;Meliopoulos, Sakis, author.<br/>Preferred Shelf Number&#160;TK1010<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119513100">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119513100</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust in computer systems and the cloud ent://SD_ILS/0/SD_ILS:597142 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Bursell, Mike, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding artificial intelligence : fundamentals and applications ent://SD_ILS/0/SD_ILS:597672 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Liu, Albert Chun-Chen, author.&#160;Law, Oscar Ming Kin, author.&#160;Law, Iain, author.<br/>Preferred Shelf Number&#160;Q335 .L58 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts ent://SD_ILS/0/SD_ILS:597703 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Poston, Howard E., III, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 P67 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Perceptions and Analysis of Digital Risks ent://SD_ILS/0/SD_ILS:597226 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Capelle, Camille.&#160;Liqu&egrave;te, Vincent.<br/>Preferred Shelf Number&#160;QA76.575<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep learning approaches to cloud security ent://SD_ILS/0/SD_ILS:597294 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Rathore, Pramod Singh, 1988- editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart manufacturing : the lean six sigma way ent://SD_ILS/0/SD_ILS:597568 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tarantino, Anthony, 1949- author.<br/>Preferred Shelf Number&#160;TS156 .T38 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119846642">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119846642</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security 2 : Biometrics, video surveillance and multimedia encryption ent://SD_ILS/0/SD_ILS:597597 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Puech, William, author.<br/>Preferred Shelf Number&#160;QA76.575 .P84 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987390">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987390</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in smart homes : architectures, solutions and technologies ent://SD_ILS/0/SD_ILS:597626 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Khatoun, Rida, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing solutions : architecture, data storage, implementation and security ent://SD_ILS/0/SD_ILS:597544 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Pal, Souvik, author.&#160;Le, Dac-Nhuong, author.&#160;Pattnai, Prasant Kumar, author.<br/>Preferred Shelf Number&#160;QA76.585 .P35 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119682318">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119682318</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in vehicular networks : focus on location and identity privacy ent://SD_ILS/0/SD_ILS:597917 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Benarous, Leila.&#160;Bitam, Salim.&#160;Mellouk, Abdelhamid.<br/>Preferred Shelf Number&#160;TE228.37<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions ent://SD_ILS/0/SD_ILS:596265 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number&#160;HD61.5 .M66 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The pentester blueprint : starting a career as an ethical hacker ent://SD_ILS/0/SD_ILS:596380 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Wylie, Phillip L., author.&#160;Crawley, Kim.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Swarm intelligence optimization : algorithms and applications ent://SD_ILS/0/SD_ILS:596458 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Kumar, Abhishek, 1989- editor.&#160;Rathore, Pramod Singh, 1988- editor.&#160;Garc&iacute;a D&iacute;az, Vicente, 1981- editor.&#160;Agrawal, Rashmi, 1978- editor.<br/>Preferred Shelf Number&#160;Q337.3 .S93 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119778868">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119778868</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio ent://SD_ILS/0/SD_ILS:596652 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Benmammar, Badr.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unmanned aerial vehicles for Internet of Things (IoT) : concepts, techniques, and applications ent://SD_ILS/0/SD_ILS:596898 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Mohindru, Vandana, editor.&#160;Singh, Yashwant, editor.&#160;Bhatt, Ravindara, editor.&#160;Gupta, Anuj Kumar, editor.<br/>Preferred Shelf Number&#160;TL589.4 .U55 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing big data platforms : how to use, deploy, and maintain big data systems ent://SD_ILS/0/SD_ILS:596905 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Aytas, Yusuf.<br/>Preferred Shelf Number&#160;QA76.9 .B45<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119690962">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119690962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conflicts, crimes and regulations in cyberspace ent://SD_ILS/0/SD_ILS:597281 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Laurent, S&eacute;bastien, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The official (ISC)2 CCSP CBK reference ent://SD_ILS/0/SD_ILS:596879 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Fife, Leslie, author.&#160;Kraus, Aaron, author.&#160;Lewis, Bryan, author.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603399">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603399</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Game theory and machine learning for cyber security ent://SD_ILS/0/SD_ILS:597035 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Kamhoua, Charles A., editor.&#160;Kiekintveld, Christopher D., editor.&#160;Fang, Fei, 1989- editor.&#160;Zhu, Quanyan, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .G353 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless blockchain : principles, technologies and applications ent://SD_ILS/0/SD_ILS:597140 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Imran, Muhammad Ali, editor.&#160;Cao, Bin, editor.&#160;Zhang, Lei, editor.&#160;Peng, Mugen, editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119790839">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119790839</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering and technology for healthcare ent://SD_ILS/0/SD_ILS:596096 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Imran, Muhammad Ali, editor.&#160;Ghannam, Rami, editor.&#160;Abbasi, Qammer H., editor.<br/>Preferred Shelf Number&#160;R855.3 .E54 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644316">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644316</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VMware&reg; Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide ent://SD_ILS/0/SD_ILS:596289 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Hall, Jon, 1963- author.&#160;Andrews, Joshua, author.<br/>Preferred Shelf Number&#160;QA76.9 .V5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security ent://SD_ILS/0/SD_ILS:596235 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Almalawi, Abdulmohsen, author.&#160;Tari, Zahir, 1961- author.&#160;Fahad, Adil, author.&#160;Yi, Xun, author.<br/>Preferred Shelf Number&#160;TJ222 .A46 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> You can stop stupid : stopping losses from accidental and malicious actions ent://SD_ILS/0/SD_ILS:596502 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Winkler, Ira, author.&#160;Brown, Tracy Celaya, author.<br/>Preferred Shelf Number&#160;HD61.5 .W55 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Official (ISC)2 SSCP CBK Reference ent://SD_ILS/0/SD_ILS:595620 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Wills, Mike.<br/>Preferred Shelf Number&#160;QA76.3 .W56 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119601951">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119601951</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> LPI Linux essentials : study guide ent://SD_ILS/0/SD_ILS:595763 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Bresnahan, Christine, author.&#160;Blum, Richard, 1962- author.<br/>Preferred Shelf Number&#160;QA76.3 .B74 L65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119657712">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119657712</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Anson, Steve.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Women of color in tech : a blueprint for inspiring and mentoring the next generation of technology innovators ent://SD_ILS/0/SD_ILS:595893 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tedrick, Susanne.<br/>Preferred Shelf Number&#160;T36<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119633532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119633532</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in humanities and social sciences : a research methods approach ent://SD_ILS/0/SD_ILS:596373 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Loiseau, Hugo, editor.&#160;Ventre, Daniel, editor.&#160;Aden, Hartmut, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence, cybersecurity and cyber defense ent://SD_ILS/0/SD_ILS:596423 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Ventre, Daniel, author.<br/>Preferred Shelf Number&#160;Q335 .V46 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime investigators handbook ent://SD_ILS/0/SD_ILS:595400 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Edwards, Graeme (Financial and cybercrime investigator), author.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> (ISC)2&reg; CCSP&reg; certified cloud security professional : official study guide ent://SD_ILS/0/SD_ILS:595787 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Malisow, Ben, author.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603528">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603528</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking connected cars : tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:595843 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Knight, Alissa, author.<br/>Preferred Shelf Number&#160;TL152.8 .K65 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security fundamentals ent://SD_ILS/0/SD_ILS:595628 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Panek, Crystal, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119650737">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119650737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data privacy and GDPR handbook ent://SD_ILS/0/SD_ILS:595643 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Sharma, Sanjay (Financial executive), author.&#160;Menon, Pranav, contributor.<br/>Preferred Shelf Number&#160;KJE6071<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119594307">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119594307</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Design and analysis of security protocol for communication ent://SD_ILS/0/SD_ILS:595798 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Goyal, Dinesh, 1976- editor.&#160;Balamurigan, A., editor.&#160;Peng, Sheng-Lung, editor.&#160;Verma, O. P. (Telecommunications engineer), editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D468 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and decision makers : data security and digital trust ent://SD_ILS/0/SD_ILS:595943 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Fr&eacute;minville, Marie de, author.<br/>Preferred Shelf Number&#160;HF5548.37 .F74 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber breach response that actually works : organizational approach to managing residual risk ent://SD_ILS/0/SD_ILS:596117 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Gorecki, Andrew.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:596276 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Carey, Marcus J. (Cybersecurity professional)&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C3673 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA CASP+ : practice tests, Exam CAS-003 ent://SD_ILS/0/SD_ILS:596286 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119683377">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119683377</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:596480 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA Cybersecurity Analyst (CySA+) Practice Tests. Exam CS0-002 ent://SD_ILS/0/SD_ILS:596927 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chapple, Mike, 1975- author.&#160;Seidl, David, CISSP, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684077">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684077</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, privacy and digital forensics in the cloud ent://SD_ILS/0/SD_ILS:594934 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chen, Lei, 1978 July 28- editor.&#160;Takabi, Hassan, 1982- editor.&#160;Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number&#160;QA76.585 .S43 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> (ISC)&sup2; SSCP systems security certified practitioner : official practice tests ent://SD_ILS/0/SD_ILS:594948 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chapple, Mike.&#160;Seidl, David, CISSP, author.<br/>Preferred Shelf Number&#160;TK5105.59 .C53 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119548270">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119548270</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social-behavioral modeling for complex systems ent://SD_ILS/0/SD_ILS:594823 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Davis, Paul K., 1943- editor.&#160;O'Mahony, Angela, editor.&#160;Pfautz, Jonathan, editor.<br/>Preferred Shelf Number&#160;HA29 .S6736 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119485001">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119485001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:595304 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Carpenter, Perry, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA CASP+&reg; Advanced security practitioner : study guide exam CAS-003 ent://SD_ILS/0/SD_ILS:595472 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Parker, Jeff T., author.&#160;Gregg, Michael (Michael C.), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575948</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA PenTest+ Study Guide : Exam PT0-001 ent://SD_ILS/0/SD_ILS:594866 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chapple, Mike, author.&#160;Seidl, David, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549420">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549420</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA PenTest+ Practice Test : Exam PT0-001 ent://SD_ILS/0/SD_ILS:595329 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Panek, Crystal, author.&#160;Tracy, Robb.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CEH v10 : certified ethical hacker study guide ent://SD_ILS/0/SD_ILS:595330 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam ent://SD_ILS/0/SD_ILS:595333 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Piper, Ben.&#160;Clinton, David.<br/>Preferred Shelf Number&#160;QA76.3 .P57 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity of industrial systems ent://SD_ILS/0/SD_ILS:595381 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Flaus, Jean-Marie, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644538">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644538</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:595415 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C368 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S36 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:594967 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;McDonough, Bart R., author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> (ISC)&sup2; SSCP systems security certified practitioner : official study guide ent://SD_ILS/0/SD_ILS:595275 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Wills, Mike, author.&#160;Seidl, David, CISSP, author.<br/>Preferred Shelf Number&#160;QA76.3<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119547921">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119547921</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT ent://SD_ILS/0/SD_ILS:595279 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tounsi, Wiem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C93 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The official (ISC)&sup2; CISSP CBK reference ent://SD_ILS/0/SD_ILS:595207 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Warsinske, John, author.&#160;Graff, Mark, contributor.&#160;Henry, Kevin, contributor.&#160;Hoover, Christopher, contributor.&#160;Malisow, Ben, contributor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119423300">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119423300</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA&reg; A+&reg; complete study guide : Exam Core 220-1001 and Exam Core 220-1002 ent://SD_ILS/0/SD_ILS:595242 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Docter, Quentin, author.&#160;Buhagiar, Jon, author.<br/>Preferred Shelf Number&#160;QA76.3 .D598 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119553588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119553588</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CCSP official (ISC)2 practice tests ent://SD_ILS/0/SD_ILS:594258 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Malisow, Ben, author.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119480280">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119480280</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA security+ : practice tests : exam SY0-501 ent://SD_ILS/0/SD_ILS:594460 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Christy, S. Russell, author.&#160;Easttom, Chuck, author.<br/>Preferred Shelf Number&#160;QA76.3 .C47 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549413">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549413</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:594635 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Hadnagy, Christopher, author.<br/>Preferred Shelf Number&#160;HM668 .H33 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:593721 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Song, Houbing, editor.&#160;Fink, Glenn A., editor.&#160;Jeschke, Sabina, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43923 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CCNA security study guide : exam 210-260 ent://SD_ILS/0/SD_ILS:594192 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;McMillan, Troy, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA CySA+ practice tests : exam CS0-001 ent://SD_ILS/0/SD_ILS:594270 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chapple, Mike, 1975- author.&#160;Seidl, David, CISSP, author.<br/>Preferred Shelf Number&#160;QA76.3<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CompTIA IT fundamentals study guide ent://SD_ILS/0/SD_ILS:594729 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Docter, Quentin, author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549574">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549574</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing and virtualization ent://SD_ILS/0/SD_ILS:594386 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Nguyen, Nhu Gia, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .V5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows security monitoring : scenarios and patterns ent://SD_ILS/0/SD_ILS:594404 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Miroshnikov, Andrei, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> (ISC)&sup2; CISSP certified information systems security professional official study guide ent://SD_ILS/0/SD_ILS:594477 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Chapple, Mike, author.&#160;Stewart, James Michael, author.&#160;Gibson, Darril, author.<br/>Preferred Shelf Number&#160;QA76.3 .C4255 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549567">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549567</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:594699 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows 10 Anniversary update bible ent://SD_ILS/0/SD_ILS:593543 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Tidrow, Rob, author.&#160;Boyce, Jim, 1958- author.&#160;Shapiro, Jeffrey R., author.<br/>Preferred Shelf Number&#160;QA76.76 .O63<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119416999">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119416999</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Real-time embedded systems ent://SD_ILS/0/SD_ILS:593770 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Wang, Jiacun, 1963- author.<br/>Preferred Shelf Number&#160;TK7895 .E42<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420712">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420712</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNS security management ent://SD_ILS/0/SD_ILS:593802 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Dooley, Michael, 1962- author.&#160;Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics ent://SD_ILS/0/SD_ILS:593814 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer vision and imaging in intelligent transportation systems ent://SD_ILS/0/SD_ILS:593561 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Loce, Robert P., editor.&#160;Bala, Raja, editor.&#160;Trivedi, Mohan M., editor.<br/>Preferred Shelf Number&#160;TE228.3<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118971666">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118971666</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity essentials ent://SD_ILS/0/SD_ILS:594756 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Brooks, Charles J., author.&#160;Grow, Christopher, author.&#160;Craig, Philip, author.&#160;Short, Donald, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:593439 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Allsopp, Wil, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Content delivery networks : fundamentals, design, and evolution ent://SD_ILS/0/SD_ILS:593580 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Robinson, Dom, author.<br/>Preferred Shelf Number&#160;TK5105.5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cyber risk handbook : creating and measuring effective cybersecurity capabilities ent://SD_ILS/0/SD_ILS:593609 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Antonucci, Domenic, author.<br/>Preferred Shelf Number&#160;HV6773 .A58 2017<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CWTS, CWS, and CWT complete study guide : Exams PW0-071, CWS-2017, CWT-2017 ent://SD_ILS/0/SD_ILS:594000 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Bartz, Robert J., 1959- author.<br/>Preferred Shelf Number&#160;TK5103.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419426">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419426</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Center Handbook. ent://SD_ILS/0/SD_ILS:593072 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Geng, Hwaiyu.<br/>Preferred Shelf Number&#160;HF5548.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119597537">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119597537</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-01-22T20:15:49Z 2026-01-22T20:15:49Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Preferred Shelf Number&#160;QA76.9 .A25 B79 2005<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>