Search Results for Computer Security - Narrowed by: Wiley E-Book Collection
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AWILEY$002509Wiley$002bE-Book$002bCollection$0026ps$003d300$0026isd$003dtrue?
2026-01-22T17:40:40Z
Computer network security
ent://SD_ILS/0/SD_ILS:595830
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Sadiqui, Ali.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer science security : concepts and tools
ent://SD_ILS/0/SD_ILS:597739
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number QA76.9 .A25 Z35 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematics for the Digital Systems Engineer Essentials for Modern Cryptography, Computer Security and Communications Technology.
ent://SD_ILS/0/SD_ILS:600431
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mitchell, Chris J.<br/>Preferred Shelf Number XX(600431.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security
ent://SD_ILS/0/SD_ILS:597085
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number QA76.9 .A25 R438 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded cryptography. 1
ent://SD_ILS/0/SD_ILS:599697
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Prouff, Emmanuel, editor. Renault, Guenael. Rivain, Mattieu. O'Flynn, Colin.<br/>Preferred Shelf Number QA76.9 .A25 E43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded Cryptography. 3
ent://SD_ILS/0/SD_ILS:599815
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 2 : Cryptanalysis and future directions
ent://SD_ILS/0/SD_ILS:598806
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Asymmetric cryptography : primitives and protocols
ent://SD_ILS/0/SD_ILS:598096
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Pointcheval, David, editor.<br/>Preferred Shelf Number QA76.9 .A25 A83 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building effective privacy programs : cybersecurity from principles to practice
ent://SD_ILS/0/SD_ILS:600111
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .P735 E34 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Defense in depth : modern cybersecurity strategies and evolving threats
ent://SD_ILS/0/SD_ILS:600191
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Zangana, Hewa Majeed, 1987- editor.<br/>Preferred Shelf Number QA76.9 .A25 D44 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Wiley handbook of art therapy
ent://SD_ILS/0/SD_ILS:600264
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Gussak, David, editor. Rosal, Marcia L., editor.<br/>Preferred Shelf Number RC489 .A7 W55 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safeguarding satellite communications : issues, challenges, and solutions
ent://SD_ILS/0/SD_ILS:600245
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author An, Jianpin, author.<br/>Preferred Shelf Number TK5104 .A53 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital immune system : principles and practices
ent://SD_ILS/0/SD_ILS:600243
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Priyambada Dash, Sujata, editor. Mishra, Vaibhav. Shaw, Bijeta. Panda, Sandeep Kumar. Balamurugan, S.<br/>Preferred Shelf Number QA76.9 .A25 D54 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI security : defense, threats, and vulnerabilities
ent://SD_ILS/0/SD_ILS:600294
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Rana, Shaila, author. Chicone, Rhonda, author.<br/>Preferred Shelf Number Q335 .R36 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep learning for intrusion detection : techniques and applications
ent://SD_ILS/0/SD_ILS:600319
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Masoodi, Faheem Syeed, editor. Bamhdi, Alwi, editor.<br/>Preferred Shelf Number TK5105.59 .D44 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer memories 1 : core concepts
ent://SD_ILS/0/SD_ILS:600350
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Darche, Philippe, author.<br/>Preferred Shelf Number TK7895 .M4 D37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging threats and countermeasures in cybersecurity
ent://SD_ILS/0/SD_ILS:599561
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Preferred Shelf Number QA76.9 .A25 E44 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reinforcement learning for cyber operations : applications of artificial intelligence for penetration testing
ent://SD_ILS/0/SD_ILS:599600
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Rahman, Abdul (Executive), author.<br/>Preferred Shelf Number Q325.6 .R34 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394206483">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394206483</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Preferred Shelf Number QA76.9 .C65 N38 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Alice and Bob learn secure coding
ent://SD_ILS/0/SD_ILS:599664
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Janca, Tanya. author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Preferred Shelf Number QA76.9 .A25 N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Edge of intelligence : exploring the frontiers of AI at the edge
ent://SD_ILS/0/SD_ILS:599759
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mahajan, Shubham, editor. Munirathinam, Sathyan, editor. Raj, Pethuru, editor.<br/>Preferred Shelf Number Q335 .E34 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Time-Sensitive Systems.
ent://SD_ILS/0/SD_ILS:599899
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Choudhury, Tanupriy. Choudhury, Tanupriya/Singh, Rahul Kuma. Tomar, Ravi.<br/>Preferred Shelf Number TA168<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimizing biofuel production with artificial intelligence
ent://SD_ILS/0/SD_ILS:599901
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Kuila, Arindam, editor. Kumar, Depak, editor.<br/>Preferred Shelf Number TP339 .O68 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Rise of the machines : when AI and zero trust collide : a Project Zero Trust story
ent://SD_ILS/0/SD_ILS:599932
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Finney, George, author. Vinduska, Zach, author.<br/>Preferred Shelf Number QA76.9 .A25 F56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CISA certified information systems auditor practice tests : covers 2024-2025 exam objectives
ent://SD_ILS/0/SD_ILS:599955
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Grego, Peter H., author. Chapple, Mike, author.<br/>Preferred Shelf Number QA76.3 .G74 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394324460">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394324460</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber recon : my life in cyber espionage and ransomware negotiation
ent://SD_ILS/0/SD_ILS:600081
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Minder, Kurtis, author.<br/>Preferred Shelf Number QA76.9 .A25 M56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security
ent://SD_ILS/0/SD_ILS:599222
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Brooks, Chuck (Writer of Inside cyber), author.<br/>Preferred Shelf Number HC79 .T4 B735 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice
ent://SD_ILS/0/SD_ILS:599377
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Edwards, Jason (Cybersecurity expert), author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The impact of algorithmic technologies on healthcare
ent://SD_ILS/0/SD_ILS:599726
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Dubey, Parul, editor Madankar, Mangala, editor Dubey, Pushkar, editor Hung, Bui Thanh, editor<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the digital frontier : threats and advanced techniques in security and forensics
ent://SD_ILS/0/SD_ILS:599732
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Sharma, Kavita, 1985- editor.<br/>Preferred Shelf Number QA76.9 .A25 S43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and cybersecurity in healthcare
ent://SD_ILS/0/SD_ILS:599741
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Agrawal, Rashmi, editor.<br/>Preferred Shelf Number R859.7 .A78 A78 2025 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Taming the hacking storm : a framework for securing and defending networks
ent://SD_ILS/0/SD_ILS:599858
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P76 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing cyber-physical systems : fundamentals, applications and challenges
ent://SD_ILS/0/SD_ILS:600260
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Ananthajothi, K., editor.<br/>Preferred Shelf Number TK5105.59 .S43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Preferred Shelf Number TK3001 .M37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communication networks in smart power grids
ent://SD_ILS/0/SD_ILS:599871
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Zhou, Boyang, author.<br/>Preferred Shelf Number TK3105 .Z46 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI-based advanced optimization techniques for edge computing
ent://SD_ILS/0/SD_ILS:599834
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mohit, Kumar, editor.<br/>Preferred Shelf Number QA76.583 .A33 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287062">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287062</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Metaverse communication and computing networks : applications, technologies, and approaches
ent://SD_ILS/0/SD_ILS:598545
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Hoang, Dinh Thai, 1986- editor. Nguyen, Diep N., editor. Nguyen, Cong T., editor. Hossain, Ekram, 1971- editor. Niyato, Dusit, editor.<br/>Preferred Shelf Number TK5105.8864 .M58 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394160013">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394160013</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The DevSecOps playbook : deliver continuous security at speed
ent://SD_ILS/0/SD_ILS:598634
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Conversational artificial intelligence
ent://SD_ILS/0/SD_ILS:598905
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Rawat, Romil, 1986- editor. Chakrawarti, Rajesh Kumar, editor Sarangi, Sanjaya Kumar, editor Vyas, Piyush, editor Alamanda, Mary Sowjanya, editor<br/>Preferred Shelf Number Q335 .C66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applying artificial intelligence in cyber security analytics and cyber threat detection
ent://SD_ILS/0/SD_ILS:599037
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mahajan, Shilpa, editor. Khurana, Mehak, editor. Estrela, Vania Vieira, editor.<br/>Preferred Shelf Number QA76.9 .A25 A674 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394196470">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394196470</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine learning applications : from computer vision to robotics
ent://SD_ILS/0/SD_ILS:598690
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chatterjee, Indranath, editor. Zalte, Sheetal S., editor. John Wiley & Sons, publisher.<br/>Preferred Shelf Number Q325.5 .M321323 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394173358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394173358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Federated learning for future intelligent wireless networks
ent://SD_ILS/0/SD_ILS:598767
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Sun, Yao, editor.<br/>Preferred Shelf Number Q325.5 .F43 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119913924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119913924</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy preservation of genomic and medical data
ent://SD_ILS/0/SD_ILS:598731
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number R859.7 .S43 P75 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213726">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213726</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automated secure computing for next-generation systems
ent://SD_ILS/0/SD_ILS:598752
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number QA76.9 .A25 A98 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart edge computing : an operation research perspective
ent://SD_ILS/0/SD_ILS:598978
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chakraborty, Rajdeep, editor. Ghosh, Anupam, editor. Mandal, Jyotsna Kumar, editor. Choudhury, Tanupriya, editor. Chatterjee, Prasenjit, editor.<br/>Preferred Shelf Number QA76.583<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fog computing for intelligent cloud IoT systems
ent://SD_ILS/0/SD_ILS:599191
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Banerjee, Chandan, editor. Ghosh, Anupam, editor. Chakraborty, Rajdeep, editor. Elngar, Ahmed A., editor.<br/>Preferred Shelf Number TK5105.8857 .F64 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Realizing the Metaverse : a communications and networking perspective
ent://SD_ILS/0/SD_ILS:599057
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Lim, Wei Yang Bryan, editor. Xiong, Zehui, editor. Niyato, Dusit, editor. Zhang, Junshan (Electrical engineer), editor. Shen, X. (Xuemin), 1958- editor.<br/>Preferred Shelf Number TK5105.8864 .R43 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical cyber intelligence : a hands-on guide to digital forensics
ent://SD_ILS/0/SD_ILS:599262
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number HV8079 .C65 J633 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integrating metaheuristics in computer vision for real-world optimization problems
ent://SD_ILS/0/SD_ILS:599305
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Preferred Shelf Number TA1637 .I58 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230952">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230952</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IoT-enabled unobtrusive surveillance systems for smart campus safety
ent://SD_ILS/0/SD_ILS:597903
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Anagnostopoulos, Theodoros, author.<br/>Preferred Shelf Number LB2866<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119903932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119903932</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in intelligent networking systems
ent://SD_ILS/0/SD_ILS:597809
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Xu, Shengjie (Professor), author. Qian, Yi, 1962- author. Hu, Rose Qingyang, author.<br/>Preferred Shelf Number TK5105.59 .X8 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine intelligence, big data analytics, and IoT in image processing : practical applications
ent://SD_ILS/0/SD_ILS:598220
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Preferred Shelf Number Q325.5 .M33 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data exfiltration threats and prevention techniques : machine learning and memory-based data security
ent://SD_ILS/0/SD_ILS:598245
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tari, Zahir, 1961- author. Sohrabi, Nasrin, 1982- author. Samadi, Yasaman, 1993- author. Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number TK5105.59 .T365 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security technologies and social implications
ent://SD_ILS/0/SD_ILS:597740
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Markarian, Garik, editor. Karlovic, Ruža, editor. Nitsch, Holger, editor. Chandramouli, Krishna, editor.<br/>Preferred Shelf Number HV7936 .A8 S39 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sustainably investing in digital assets globally
ent://SD_ILS/0/SD_ILS:597764
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Ozelli, Selva, author.<br/>Preferred Shelf Number HG4515.15 .O38 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolving networking technologies : developments and future directions
ent://SD_ILS/0/SD_ILS:598339
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Gupta, Shaurya, editor.<br/>Preferred Shelf Number TK5105.5 .E96 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime during the SARS-CoV-2 pandemic (2019-2022)
ent://SD_ILS/0/SD_ILS:598517
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number HV6773 .C93 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber investigations : a research based textbook for advanced studies
ent://SD_ILS/0/SD_ILS:597931
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65 C933 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582021</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing delay-tolerant networks with BPSec
ent://SD_ILS/0/SD_ILS:598174
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Birrane, Edward J., author. Heiner, Sarah, author. McKeever, Ken, author.<br/>Preferred Shelf Number TK5105.59 .B48 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119823513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119823513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI and machine learning for network and security management
ent://SD_ILS/0/SD_ILS:598294
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Wu, Yulei, author. Ge, Jingguo, author. Li, Tong, author.<br/>Preferred Shelf Number Q335 .W8 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Corporate cybersecurity : identifying risks and the bug bounty program
ent://SD_ILS/0/SD_ILS:596785
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Jackson, John (Cybersecurity professional), author.<br/>Preferred Shelf Number HD30.38 .J34 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and local government
ent://SD_ILS/0/SD_ILS:597392
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Norris, Donald F., author. Mateczun, Laura, author. Forno, Richard, author.<br/>Preferred Shelf Number JS331 .N67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing cybersecurity in the process industries
ent://SD_ILS/0/SD_ILS:597508
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Preferred Shelf Number TP155.7<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861812</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The digital agricultural revolution : innovations and challenges in agriculture through technology disruptions
ent://SD_ILS/0/SD_ILS:597521
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Bhatnagar, Roheet, editor. Tripathi, Nitin Kumar, editor. Bhatnagar, Nitu, editor. Panda, Chandan Kumar, editor.<br/>Preferred Shelf Number S494.5 .I5 D54 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119823469">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119823469</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia security. 1, Authentication and data hiding
ent://SD_ILS/0/SD_ILS:597454
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Puech, William, editor.<br/>Preferred Shelf Number QA76.575<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119901808">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119901808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tools, languages, methodologies for representing semantics on the web of things
ent://SD_ILS/0/SD_ILS:597905
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mehta, Shikha, editor.<br/>Preferred Shelf Number TK1505.88815<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394171460">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394171460</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework
ent://SD_ILS/0/SD_ILS:597029
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Brumfield, Cynthia, author. Haugli, Brian, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 B82 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119816348">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119816348</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Power system protection
ent://SD_ILS/0/SD_ILS:597296
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Anderson, Paul M., author. Henville, Charles, author. Rifaat, Rasheek, author. Johnson, Brian, author. Meliopoulos, Sakis, author.<br/>Preferred Shelf Number TK1010<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119513100">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119513100</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust in computer systems and the cloud
ent://SD_ILS/0/SD_ILS:597142
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Bursell, Mike, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding artificial intelligence : fundamentals and applications
ent://SD_ILS/0/SD_ILS:597672
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Liu, Albert Chun-Chen, author. Law, Oscar Ming Kin, author. Law, Iain, author.<br/>Preferred Shelf Number Q335 .L58 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts
ent://SD_ILS/0/SD_ILS:597703
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Poston, Howard E., III, author.<br/>Preferred Shelf Number QA76.9 .B56 P67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Perceptions and Analysis of Digital Risks
ent://SD_ILS/0/SD_ILS:597226
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Capelle, Camille. Liquète, Vincent.<br/>Preferred Shelf Number QA76.575<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119887959</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep learning approaches to cloud security
ent://SD_ILS/0/SD_ILS:597294
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Rathore, Pramod Singh, 1988- editor.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Moyo, Siegfried, author.<br/>Preferred Shelf Number HF5548.37 .M68 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart manufacturing : the lean six sigma way
ent://SD_ILS/0/SD_ILS:597568
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tarantino, Anthony, 1949- author.<br/>Preferred Shelf Number TS156 .T38 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119846642">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119846642</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia security 2 : Biometrics, video surveillance and multimedia encryption
ent://SD_ILS/0/SD_ILS:597597
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Puech, William, author.<br/>Preferred Shelf Number QA76.575 .P84 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987390">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987390</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in smart homes : architectures, solutions and technologies
ent://SD_ILS/0/SD_ILS:597626
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing solutions : architecture, data storage, implementation and security
ent://SD_ILS/0/SD_ILS:597544
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Pal, Souvik, author. Le, Dac-Nhuong, author. Pattnai, Prasant Kumar, author.<br/>Preferred Shelf Number QA76.585 .P35 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119682318">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119682318</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in vehicular networks : focus on location and identity privacy
ent://SD_ILS/0/SD_ILS:597917
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Benarous, Leila. Bitam, Salim. Mellouk, Abdelhamid.<br/>Preferred Shelf Number TE228.37<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions
ent://SD_ILS/0/SD_ILS:596265
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number HD61.5 .M66 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The pentester blueprint : starting a career as an ethical hacker
ent://SD_ILS/0/SD_ILS:596380
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Wylie, Phillip L., author. Crawley, Kim.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Swarm intelligence optimization : algorithms and applications
ent://SD_ILS/0/SD_ILS:596458
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Kumar, Abhishek, 1989- editor. Rathore, Pramod Singh, 1988- editor. García Díaz, Vicente, 1981- editor. Agrawal, Rashmi, 1978- editor.<br/>Preferred Shelf Number Q337.3 .S93 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119778868">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119778868</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio
ent://SD_ILS/0/SD_ILS:596652
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Benmammar, Badr.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Unmanned aerial vehicles for Internet of Things (IoT) : concepts, techniques, and applications
ent://SD_ILS/0/SD_ILS:596898
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Mohindru, Vandana, editor. Singh, Yashwant, editor. Bhatt, Ravindara, editor. Gupta, Anuj Kumar, editor.<br/>Preferred Shelf Number TL589.4 .U55 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing big data platforms : how to use, deploy, and maintain big data systems
ent://SD_ILS/0/SD_ILS:596905
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Aytas, Yusuf.<br/>Preferred Shelf Number QA76.9 .B45<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119690962">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119690962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Conflicts, crimes and regulations in cyberspace
ent://SD_ILS/0/SD_ILS:597281
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Laurent, Sébastien, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The official (ISC)2 CCSP CBK reference
ent://SD_ILS/0/SD_ILS:596879
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Fife, Leslie, author. Kraus, Aaron, author. Lewis, Bryan, author.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603399">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603399</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game theory and machine learning for cyber security
ent://SD_ILS/0/SD_ILS:597035
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Kamhoua, Charles A., editor. Kiekintveld, Christopher D., editor. Fang, Fei, 1989- editor. Zhu, Quanyan, editor.<br/>Preferred Shelf Number TK5105.59 .G353 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless blockchain : principles, technologies and applications
ent://SD_ILS/0/SD_ILS:597140
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Imran, Muhammad Ali, editor. Cao, Bin, editor. Zhang, Lei, editor. Peng, Mugen, editor.<br/>Preferred Shelf Number QA76.9 .B56<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119790839">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119790839</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering and technology for healthcare
ent://SD_ILS/0/SD_ILS:596096
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Imran, Muhammad Ali, editor. Ghannam, Rami, editor. Abbasi, Qammer H., editor.<br/>Preferred Shelf Number R855.3 .E54 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644316">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644316</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
VMware® Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guide
ent://SD_ILS/0/SD_ILS:596289
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Hall, Jon, 1963- author. Andrews, Joshua, author.<br/>Preferred Shelf Number QA76.9 .V5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security
ent://SD_ILS/0/SD_ILS:596235
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Almalawi, Abdulmohsen, author. Tari, Zahir, 1961- author. Fahad, Adil, author. Yi, Xun, author.<br/>Preferred Shelf Number TJ222 .A46 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
You can stop stupid : stopping losses from accidental and malicious actions
ent://SD_ILS/0/SD_ILS:596502
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Winkler, Ira, author. Brown, Tracy Celaya, author.<br/>Preferred Shelf Number HD61.5 .W55 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119623946</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Official (ISC)2 SSCP CBK Reference
ent://SD_ILS/0/SD_ILS:595620
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Wills, Mike.<br/>Preferred Shelf Number QA76.3 .W56 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119601951">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119601951</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
LPI Linux essentials : study guide
ent://SD_ILS/0/SD_ILS:595763
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Bresnahan, Christine, author. Blum, Richard, 1962- author.<br/>Preferred Shelf Number QA76.3 .B74 L65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119657712">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119657712</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Women of color in tech : a blueprint for inspiring and mentoring the next generation of technology innovators
ent://SD_ILS/0/SD_ILS:595893
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tedrick, Susanne.<br/>Preferred Shelf Number T36<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119633532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119633532</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in humanities and social sciences : a research methods approach
ent://SD_ILS/0/SD_ILS:596373
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Loiseau, Hugo, editor. Ventre, Daniel, editor. Aden, Hartmut, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119777588</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence, cybersecurity and cyber defense
ent://SD_ILS/0/SD_ILS:596423
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Ventre, Daniel, author.<br/>Preferred Shelf Number Q335 .V46 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime investigators handbook
ent://SD_ILS/0/SD_ILS:595400
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Edwards, Graeme (Financial and cybercrime investigator), author.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119596318</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
(ISC)2® CCSP® certified cloud security professional : official study guide
ent://SD_ILS/0/SD_ILS:595787
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Malisow, Ben, author.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603528">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119603528</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:595887
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking connected cars : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:595843
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Knight, Alissa, author.<br/>Preferred Shelf Number TL152.8 .K65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security fundamentals
ent://SD_ILS/0/SD_ILS:595628
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Panek, Crystal, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119650737">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119650737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data privacy and GDPR handbook
ent://SD_ILS/0/SD_ILS:595643
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Sharma, Sanjay (Financial executive), author. Menon, Pranav, contributor.<br/>Preferred Shelf Number KJE6071<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119594307">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119594307</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Design and analysis of security protocol for communication
ent://SD_ILS/0/SD_ILS:595798
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Goyal, Dinesh, 1976- editor. Balamurigan, A., editor. Peng, Sheng-Lung, editor. Verma, O. P. (Telecommunications engineer), editor.<br/>Preferred Shelf Number TK5105.59 .D468 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber breach response that actually works : organizational approach to managing residual risk
ent://SD_ILS/0/SD_ILS:596117
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Gorecki, Andrew.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity
ent://SD_ILS/0/SD_ILS:596276
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA CASP+ : practice tests, Exam CAS-003
ent://SD_ILS/0/SD_ILS:596286
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119683377">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119683377</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security engineering : a guide to building dependable distributed systems
ent://SD_ILS/0/SD_ILS:596480
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA Cybersecurity Analyst (CySA+) Practice Tests. Exam CS0-002
ent://SD_ILS/0/SD_ILS:596927
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chapple, Mike, 1975- author. Seidl, David, CISSP, author.<br/>Preferred Shelf Number QA76.9 .A25 C43 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684077">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119684077</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:594934
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chen, Lei, 1978 July 28- editor. Takabi, Hassan, 1982- editor. Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number QA76.585 .S43 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
(ISC)² SSCP systems security certified practitioner : official practice tests
ent://SD_ILS/0/SD_ILS:594948
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chapple, Mike. Seidl, David, CISSP, author.<br/>Preferred Shelf Number TK5105.59 .C53 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119548270">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119548270</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social-behavioral modeling for complex systems
ent://SD_ILS/0/SD_ILS:594823
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Davis, Paul K., 1943- editor. O'Mahony, Angela, editor. Pfautz, Jonathan, editor.<br/>Preferred Shelf Number HA29 .S6736 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119485001">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119485001</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA CASP+® Advanced security practitioner : study guide exam CAS-003
ent://SD_ILS/0/SD_ILS:595472
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Parker, Jeff T., author. Gregg, Michael (Michael C.), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575948</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA PenTest+ Study Guide : Exam PT0-001
ent://SD_ILS/0/SD_ILS:594866
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chapple, Mike, author. Seidl, David, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549420">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549420</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for distributed systems security
ent://SD_ILS/0/SD_ILS:595146
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Shetty, Sachin, editor. Kamhoua, Charles A., edtior. Njilla, Laurent L., editor.<br/>Preferred Shelf Number QA76.9 .B56 B56 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA PenTest+ Practice Test : Exam PT0-001
ent://SD_ILS/0/SD_ILS:595329
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Panek, Crystal, author. Tracy, Robb.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CEH v10 : certified ethical hacker study guide
ent://SD_ILS/0/SD_ILS:595330
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Messier, Ric, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam
ent://SD_ILS/0/SD_ILS:595333
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Piper, Ben. Clinton, David.<br/>Preferred Shelf Number QA76.3 .P57 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119574408</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity of industrial systems
ent://SD_ILS/0/SD_ILS:595381
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Flaus, Jean-Marie, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644538">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644538</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
We have root : even more advice from Schneier on security
ent://SD_ILS/0/SD_ILS:595432
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
ent://SD_ILS/0/SD_ILS:594967
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author McDonough, Bart R., author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
(ISC)² SSCP systems security certified practitioner : official study guide
ent://SD_ILS/0/SD_ILS:595275
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Wills, Mike, author. Seidl, David, CISSP, author.<br/>Preferred Shelf Number QA76.3<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119547921">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119547921</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The official (ISC)² CISSP CBK reference
ent://SD_ILS/0/SD_ILS:595207
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Warsinske, John, author. Graff, Mark, contributor. Henry, Kevin, contributor. Hoover, Christopher, contributor. Malisow, Ben, contributor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119423300">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119423300</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA® A+® complete study guide : Exam Core 220-1001 and Exam Core 220-1002
ent://SD_ILS/0/SD_ILS:595242
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Docter, Quentin, author. Buhagiar, Jon, author.<br/>Preferred Shelf Number QA76.3 .D598 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119553588">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119553588</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CCSP official (ISC)2 practice tests
ent://SD_ILS/0/SD_ILS:594258
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Malisow, Ben, author.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119480280">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119480280</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:594455
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA security+ : practice tests : exam SY0-501
ent://SD_ILS/0/SD_ILS:594460
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Christy, S. Russell, author. Easttom, Chuck, author.<br/>Preferred Shelf Number QA76.3 .C47 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549413">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549413</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social engineering : the science of human hacking
ent://SD_ILS/0/SD_ILS:594635
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Hadnagy, Christopher, author.<br/>Preferred Shelf Number HM668 .H33 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and privacy in cyber-physical systems : foundations, principles, and applications
ent://SD_ILS/0/SD_ILS:593721
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Song, Houbing, editor. Fink, Glenn A., editor. Jeschke, Sabina, editor.<br/>Preferred Shelf Number TK5105.59 .S43923 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CCNA security study guide : exam 210-260
ent://SD_ILS/0/SD_ILS:594192
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author McMillan, Troy, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA CySA+ practice tests : exam CS0-001
ent://SD_ILS/0/SD_ILS:594270
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chapple, Mike, 1975- author. Seidl, David, CISSP, author.<br/>Preferred Shelf Number QA76.3<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA IT fundamentals study guide
ent://SD_ILS/0/SD_ILS:594729
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Docter, Quentin, author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549574">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549574</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing and virtualization
ent://SD_ILS/0/SD_ILS:594386
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Nguyen, Nhu Gia, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .V5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows security monitoring : scenarios and patterns
ent://SD_ILS/0/SD_ILS:594404
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Miroshnikov, Andrei, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider threats
ent://SD_ILS/0/SD_ILS:594407
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
(ISC)² CISSP certified information systems security professional official study guide
ent://SD_ILS/0/SD_ILS:594477
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Chapple, Mike, author. Stewart, James Michael, author. Gibson, Darril, author.<br/>Preferred Shelf Number QA76.3 .C4255 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549567">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549567</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An introduction to cyber modeling and simulation
ent://SD_ILS/0/SD_ILS:594699
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows 10 Anniversary update bible
ent://SD_ILS/0/SD_ILS:593543
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Tidrow, Rob, author. Boyce, Jim, 1958- author. Shapiro, Jeffrey R., author.<br/>Preferred Shelf Number QA76.76 .O63<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119416999">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119416999</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Real-time embedded systems
ent://SD_ILS/0/SD_ILS:593770
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Wang, Jiacun, 1963- author.<br/>Preferred Shelf Number TK7895 .E42<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420712">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420712</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Messier, Ric, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer vision and imaging in intelligent transportation systems
ent://SD_ILS/0/SD_ILS:593561
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Loce, Robert P., editor. Bala, Raja, editor. Trivedi, Mohan M., editor.<br/>Preferred Shelf Number TE228.3<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118971666">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118971666</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking the hacker : learn from the experts who take down hackers
ent://SD_ILS/0/SD_ILS:593636
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:594756
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced penetration testing : hacking the world's most secure networks
ent://SD_ILS/0/SD_ILS:593439
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Allsopp, Wil, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Content delivery networks : fundamentals, design, and evolution
ent://SD_ILS/0/SD_ILS:593580
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Robinson, Dom, author.<br/>Preferred Shelf Number TK5105.5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119249924</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
ent://SD_ILS/0/SD_ILS:593609
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Antonucci, Domenic, author.<br/>Preferred Shelf Number HV6773 .A58 2017<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CWTS, CWS, and CWT complete study guide : Exams PW0-071, CWS-2017, CWT-2017
ent://SD_ILS/0/SD_ILS:594000
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Bartz, Robert J., 1959- author.<br/>Preferred Shelf Number TK5103.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419426">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419426</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Center Handbook.
ent://SD_ILS/0/SD_ILS:593072
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Geng, Hwaiyu.<br/>Preferred Shelf Number HF5548.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119597537">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119597537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction : a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:593044
2026-01-22T17:40:40Z
2026-01-22T17:40:40Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Preferred Shelf Number QA76.9 .A25 B79 2005<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>