Search Results for Computer Security
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026ps$003d300$0026isd$003dtrue?
2026-01-20T16:12:18Z
Computer security handbook
ent://SD_ILS/0/SD_ILS:10921
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Computer Security Research Group.<br/>Preferred Shelf Number HF 5548.2 C58177 1973<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer network security
ent://SD_ILS/0/SD_ILS:595830
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Sadiqui, Ali.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security basic
ent://SD_ILS/0/SD_ILS:41083
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Russell, Deborah. Gangemi, G. T., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 R87 1991<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security solutions
ent://SD_ILS/0/SD_ILS:32336
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hruska, Jan, 1957- Jackson, K. M., ort. yaz.<br/>Preferred Shelf Number QA 76.76.C6 H78 1990<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer Network Security
ent://SD_ILS/0/SD_ILS:165113
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical computer network security
ent://SD_ILS/0/SD_ILS:61567
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hendry, Mike.<br/>Preferred Shelf Number TK 5105.59 H46 1995<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Elements of Computer Security
ent://SD_ILS/0/SD_ILS:168393
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Computer Security
ent://SD_ILS/0/SD_ILS:175390
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Salomon, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security risk management
ent://SD_ILS/0/SD_ILS:32379
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Palmer, Ian C. Potter, G. A., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 P182 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:313473
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Stallings, William. Brown, Lawrie<br/>Preferred Shelf Number QA76.9 S73 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer science security : concepts and tools
ent://SD_ILS/0/SD_ILS:597739
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number QA76.9 .A25 Z35 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and Network Security Essentials
ent://SD_ILS/0/SD_ILS:402651
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Daimi, Kevin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:459518
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Computer Network Security
ent://SD_ILS/0/SD_ILS:331005
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331005.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Guide to Computer Network Security
ent://SD_ILS/0/SD_ILS:175855
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kizza, Joseph Migga. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-84800-917-2">http://dx.doi.org/10.1007/978-1-84800-917-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enhancing computer security with smart technology
ent://SD_ILS/0/SD_ILS:544823
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Vemuri, V. Rao.<br/>Preferred Shelf Number TK5105.59 .E62 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Statistical methods in computer security
ent://SD_ILS/0/SD_ILS:546938
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Chen, William W. S.<br/>Preferred Shelf Number QA76.9 .A25 S737 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420030884">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:314021
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number QA76.9.A25 B56 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
A handbook of computer security
ent://SD_ILS/0/SD_ILS:32378
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hearnden, K., ed. by<br/>Preferred Shelf Number QA 76.9.A25 H191 1990<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
The Art of War for Computer Security
ent://SD_ILS/0/SD_ILS:483808
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security of e-Systems and Computer Networks
ent://SD_ILS/0/SD_ILS:236023
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Obaidat, Mohammad. Boudriga, Noureddine.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511536700">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security in the 21st Century
ent://SD_ILS/0/SD_ILS:165001
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Lee, D. T. editor. Shieh, S. P. editor. Tygar, J. D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Mathematics for the Digital Systems Engineer Essentials for Modern Cryptography, Computer Security and Communications Technology.
ent://SD_ILS/0/SD_ILS:600431
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Mitchell, Chris J.<br/>Preferred Shelf Number XX(600431.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security. ESORICS 2022 International Workshops CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520983
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Katsikas, Sokratis. editor. (orcid) Cuppens, Frédéric. editor. Kalloniatis, Christos. editor. (orcid) Mylopoulos, John. editor. Pallas, Frank. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-25460-4">https://doi.org/10.1007/978-3-031-25460-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops ASSURE, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE, Toulouse, France, September 19, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521137
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Guiochet, Jérémie. editor. Tonetta, Stefano. editor. Schoitsch, Erwin. editor. Roy, Matthieu. editor. Bitsch, Friedemann. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-40953-0">https://doi.org/10.1007/978-3-031-40953-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20-22, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521134
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Guiochet, Jérémie. editor. Tonetta, Stefano. editor. Bitsch, Friedemann. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-40923-3">https://doi.org/10.1007/978-3-031-40923-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521115
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Shikata, Junji. editor. Kuzuno, Hiroki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-41326-1">https://doi.org/10.1007/978-3-031-41326-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced computer science applications : recent trends in AI, machine learning, and network security
ent://SD_ILS/0/SD_ILS:583149
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Singh, Karan, 1981- editor. Banda, Latha, 1983- editor. Manjul, Manisha, 1982- editor.<br/>Preferred Shelf Number Q335 .A38 2023<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003369066">https://www.taylorfrancis.com/books/9781003369066</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices
ent://SD_ILS/0/SD_ILS:553601
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Alexandrou, Alex (Professor of information technology security), author.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security
ent://SD_ILS/0/SD_ILS:597085
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number QA76.9 .A25 R438 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483391
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814 Antón, Annie. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484666
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751 Yagi, Takeshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484867
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331 Troubitsyna, Elena. editor. Gashi, Ilir. editor. Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443 Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:484909
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Sako, Kazue. editor. Schneider, Steve. editor. (orcid)0000-0001-8365-6993 Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:484910
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Sako, Kazue. editor. Schneider, Steve. editor. (orcid)0000-0001-8365-6993 Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 38th International Conference, SAFECOMP 2019, Turku, Finland, September 11–13, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483736
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331 Troubitsyna, Elena. editor. Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-26601-1">https://doi.org/10.1007/978-3-030-26601-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402736
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201 Campegiani, Paolo. editor. Czachórski, Tadeusz. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Komnios, Ioannis. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, Västerås, Sweden, September 19-21, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400344
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gallina, Barbara. editor. (orcid)0000-0002-6952-1053 Skavhaug, Amund. editor. Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
ent://SD_ILS/0/SD_ILS:401907
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Petrenko, Sergei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401940
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Education – Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399019
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400045
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X Kutyłowski, Mirosław. editor. (orcid)0000-0003-3192-2430 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400111
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Inomata, Atsuo. editor. Yasuda, Kan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:399699
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Lopez, Javier. editor. Zhou, Jianying. editor. Soriano, Miguel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:399718
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Lopez, Javier. editor. Zhou, Jianying. editor. Soriano, Miguel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Västerås, Sweden, September 18, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399783
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gallina, Barbara. editor. (orcid)0000-0002-6952-1053 Skavhaug, Amund. editor. Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443 Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99229-7">https://doi.org/10.1007/978-3-319-99229-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
COMPUTER SECURITY LITERACY : staying safe in a digital world.
ent://SD_ILS/0/SD_ILS:540788
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author JACOBSON, DOUGLAS.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429108129">https://www.taylorfrancis.com/books/9780429108129</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518843
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Tanaka, Keisuke. editor. Suga, Yuji. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-22425-1">https://doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519026
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Koornneef, Floor. editor. van Gulijk, Coen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-24255-2">https://doi.org/10.1007/978-3-319-24255-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:518827
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Pernul, Günther. editor. Y A Ryan, Peter. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-24174-6">https://doi.org/10.1007/978-3-319-24174-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519092
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Koornneef, Floor. editor. van Gulijk, Coen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-24249-1">https://doi.org/10.1007/978-3-319-24249-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:519267
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Pernul, Günther. editor. Y A Ryan, Peter. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-24177-7">https://doi.org/10.1007/978-3-319-24177-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
ent://SD_ILS/0/SD_ILS:487789
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kutylowski, Miroslaw. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What Is Computer Science? An Information Security Perspective
ent://SD_ILS/0/SD_ILS:488536
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Page, Daniel. author. Smart, Nigel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489123
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kutylowski, Miroslaw. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:482801
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bondavalli, Andrea. editor. Di Giandomenico, Felicita. editor. (orcid)0000-0002-8760-7299 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10506-2">https://doi.org/10.1007/978-3-319-10506-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485676
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bondavalli, Andrea. editor. Ceccarelli, Andrea. editor. Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10557-4">https://doi.org/10.1007/978-3-319-10557-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487372
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487966
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Martinez Perez, Gregorio. editor. Thampi, Sabu M. editor. Ko, Ryan. editor. Shu, Lei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334909
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335005
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bitsch, Friedemann. editor. Guiochet, Jérémie. editor. Kaâniche, Mohamed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335005.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197329
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Foresti, Sara. editor. Yung, Moti. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197419
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197420
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197425
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197475
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197479
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Thampi, Sabu M. editor. Zomaya, Albert Y. editor. Strufe, Thorsten. editor. Alcaraz Calero, Jose M. editor. Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer architecture and security : fundamentals of designing secure computer systems
ent://SD_ILS/0/SD_ILS:248865
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197586
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kim, Tai-hoon. editor. Stoica, Adrian. editor. Fang, Wai-chi. editor. Vasilakos, Thanos. editor. Villalba, Javier García. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35264-5">http://dx.doi.org/10.1007/978-3-642-35264-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2011 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings
ent://SD_ILS/0/SD_ILS:195458
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Atluri, Vijay. editor. Diaz, Claudia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23822-2">http://dx.doi.org/10.1007/978-3-642-23822-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the cloud cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:148980
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195586
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Flammini, Francesco. editor. Bologna, Sandro. editor. Vittorini, Valeria. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192988
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gritzalis, Dimitris. editor. Preneel, Bart. editor. Theoharidou, Marianthi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15497-3">http://dx.doi.org/10.1007/978-3-642-15497-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193422
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192743
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14706-7">http://dx.doi.org/10.1007/978-3-642-14706-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193040
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Schoitsch, Erwin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190950
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Backes, Michael. editor. Ning, Peng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190960
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Buth, Bettina. editor. Rabe, Gerd. editor. Seyfarth, Till. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191078
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191425
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Datta, Anupam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188815
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188894
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Harrison, Michael D. editor. Sujan, Mark-Alexander. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy
ent://SD_ILS/0/SD_ILS:164757
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Jajodia, Sushil. editor. Samarati, Pierangela. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security
ent://SD_ILS/0/SD_ILS:188061
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
ent://SD_ILS/0/SD_ILS:297432
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189031
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Jajodia, Sushil. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189294
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Matsuura, Kanta. editor. Fujisaki, Eiichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
ent://SD_ILS/0/SD_ILS:187023
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187335
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Saglietti, Francesca. editor. Oster, Norbert. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187283
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Biskup, Joachim. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187467
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187727
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine Learning and Data Mining for Computer Security Methods and Applications
ent://SD_ILS/0/SD_ILS:175344
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Maloof, Marcus A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184783
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gollmann, Dieter. editor. Meier, Jan. editor. Sabelfeld, Andrei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:184859
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Górski, Janusz. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185034
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Yoshiura, Hiroshi. editor. Sakurai, Kouichi. editor. Rannenberg, Kai. editor. Murayama, Yuko. editor. Kawamura, Shinichi. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometrics, Computer Security Systems and Artificial Intelligence Applications
ent://SD_ILS/0/SD_ILS:166154
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Saeed, Khalid. editor. Pejaś, Jerzy. editor. Mosdorf, Romuald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Essential computer security everyone's guide to e-mail, Internet, and wireless security
ent://SD_ILS/0/SD_ILS:145840
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bradley, Tony, 1969- Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20–25, 2006, Santiago, Chile
ent://SD_ILS/0/SD_ILS:166080
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gaïti, Dominique. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183052
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Vimercati, Sabrina de Capitani. editor. Syverson, Paul. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France
ent://SD_ILS/0/SD_ILS:165011
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Dimitrakos, Theo. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
ent://SD_ILS/0/SD_ILS:164931
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Pejaś, Jerzy. editor. Piegat, Andrzej. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183066
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings
ent://SD_ILS/0/SD_ILS:183068
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Winther, Rune. editor. Gran, Bjørn Axel. editor. Dahll, Gustav. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enhanced methods in computer security, biometric and artificial intelligence systems
ent://SD_ILS/0/SD_ILS:109864
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Advances in hardware design for security and trust
ent://SD_ILS/0/SD_ILS:573623
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Vemuri, Ranga, editor. Emmert, John, editor.<br/>Preferred Shelf Number TK7870<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510949">https://www.taylorfrancis.com/books/9781003510949</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded Cryptography. 3
ent://SD_ILS/0/SD_ILS:599815
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded cryptography. 1
ent://SD_ILS/0/SD_ILS:599697
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Prouff, Emmanuel, editor. Renault, Guenael. Rivain, Mattieu. O'Flynn, Colin.<br/>Preferred Shelf Number QA76.9 .A25 E43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 2 : Cryptanalysis and future directions
ent://SD_ILS/0/SD_ILS:598806
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hands on hacking
ent://SD_ILS/0/SD_ILS:596316
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hickey, Matthew (Computer security expert), author. Arcuri, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 H53 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Qian, Yi, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital watermarking and steganography
ent://SD_ILS/0/SD_ILS:146474
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Cox, I. J. (Ingemar J.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Asymmetric cryptography : primitives and protocols
ent://SD_ILS/0/SD_ILS:598096
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Pointcheval, David, editor.<br/>Preferred Shelf Number QA76.9 .A25 A83 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The business of cyber : why you should question what your security team are telling you
ent://SD_ILS/0/SD_ILS:592690
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Fagan, Peter (Writer on computer security), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003380962">https://www.taylorfrancis.com/books/9781003380962</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dark world : a book on the deep Dark Web
ent://SD_ILS/0/SD_ILS:586022
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ali, Atif, author. Qasim, Muhammad (Computer security expert), author.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404330">https://www.taylorfrancis.com/books/9781003404330</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Attribute-Based Encryption and Access Control
ent://SD_ILS/0/SD_ILS:569930
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Huang, Dijiang. Dong, Qiuxiang. Zhu, Yan (Professor of computer security)<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781351210607">https://www.taylorfrancis.com/books/9781351210607</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the digital realm : advances in hardware and software security, communication, and forensics
ent://SD_ILS/0/SD_ILS:576480
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Arif, Muhammad (Computer scientist), editor. Jaffar, M. Arfan, editor. Geman, Oana, editor. Abbasi, Waseem, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497851">https://www.taylorfrancis.com/books/9781003497851</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
NETWORK SECURITY AND DATA PRIVACY IN 6G COMMUNICATION trends, challenges, and applications.
ent://SD_ILS/0/SD_ILS:589127
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kumar, Rajendra (Associate professor in computer science), editor. Jain, Vishal, 1983- editor. Ather, Danish, editor. Kukreja, Vinay, editor. Singhal, Manoj, editor.<br/>Preferred Shelf Number TK5103.252<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003583127">https://www.taylorfrancis.com/books/9781003583127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence technology in healthcare : security and privacy issues
ent://SD_ILS/0/SD_ILS:574411
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Sharma, Neha (Computer scientist), editor. Srivastava, Durgesh (Computer scientist), editor. Sinwar, Deepak, editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Security : Attacks, Techniques, Tools, and Challenges.
ent://SD_ILS/0/SD_ILS:551724
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Mishra, Preeti (Computer scientist), author. Pilli, Emmanuel S. (Emmanuel Shubhakar), author. Joshi, R. C., author.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003004486">https://www.taylorfrancis.com/books/9781003004486</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security analytics for the internet of everything
ent://SD_ILS/0/SD_ILS:560404
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ahmed, Mohiuddin (Computer scientist) Abu Barkat, Abu. Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003010463">https://www.taylorfrancis.com/books/9781003010463</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:539793
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
International law and security in Indo-Pacific : strategic design for the region
ent://SD_ILS/0/SD_ILS:552367
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Siekiera, Joanna, editor.<br/>Preferred Shelf Number KZA1146 .I53 I58 2026<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003545750">https://www.taylorfrancis.com/books/9781003545750</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent networks and systems : advanced technologies and applications
ent://SD_ILS/0/SD_ILS:553413
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Siddique, N. H., editor. Arefin, Mohammad Shamsul, editor. Noori, Sheak Rashed Haider, editor. Kaiser, M. Shamim, editor.<br/>Preferred Shelf Number QA76.76 .E95<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032659770">https://www.taylorfrancis.com/books/9781032659770</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:542831
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Technology, AI, and operational security in banking : mastering cybersecurity and tech risk management
ent://SD_ILS/0/SD_ILS:573707
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Young, Richard Gwashy, author.<br/>Preferred Shelf Number HG1709<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003654742">https://www.taylorfrancis.com/books/9781003654742</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing a healthcare facility : a guide to implementing a comprehensive cybersecurity program for small to medium-sized facilities
ent://SD_ILS/0/SD_ILS:573708
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Sliger, Derek, author.<br/>Preferred Shelf Number RA963<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003654797">https://www.taylorfrancis.com/books/9781003654797</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
FROM SMART CITIES TO THE METAVERSE a journey through cybersecurity, ai, and Urban Sustainability.
ent://SD_ILS/0/SD_ILS:591060
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Preferred Shelf Number Q335<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003619819">https://www.taylorfrancis.com/books/9781003619819</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
State, security and cyberwar : the quest for digital peace
ent://SD_ILS/0/SD_ILS:592919
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Singh, Thangjam K., author. Jha, Sanjay K., author.<br/>Preferred Shelf Number JC311<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003630319">https://www.taylorfrancis.com/books/9781003630319</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum algorithms for enhancing cybersecurity in computational intelligence in healthcare
ent://SD_ILS/0/SD_ILS:589137
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Singhal, Prateek, editor. Mishra, Pramod Kumar, editor. Hasan, Mokhtar Mohammed, editor.<br/>Preferred Shelf Number R858<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597414">https://www.taylorfrancis.com/books/9781003597414</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark essentials : simplifying network security and troubleshooting
ent://SD_ILS/0/SD_ILS:580421
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Soni, Arun, author.<br/>Preferred Shelf Number TK5105.55<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003539261">https://www.taylorfrancis.com/books/9781003539261</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zero-trust learning : applications in modern network security
ent://SD_ILS/0/SD_ILS:580582
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kaushal, Chetna, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781779643575">https://www.taylorfrancis.com/books/9781779643575</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI for cybersecurity : fundamentals, applications, risks, and opportunities
ent://SD_ILS/0/SD_ILS:584274
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Nguyen, Diep N., author. Vu, Ly T., author Nguyen, Quang Uy, author Hoang, Dinh Thai, 1986- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003502531">https://www.taylorfrancis.com/books/9781003502531</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
INDUSTRIAL INTERNET OF THINGS FOR RESPONSIBLE TECHNOLOGY
ent://SD_ILS/0/SD_ILS:586208
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587903">https://www.taylorfrancis.com/books/9781003587903</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The psychology of cybersecurity : hacking and the human mind
ent://SD_ILS/0/SD_ILS:586224
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Singh, Tarnveer, author. Zheng, Sarah Y., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003610533">https://www.taylorfrancis.com/books/9781003610533</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber risk management in practice : a guide to real-world solutions
ent://SD_ILS/0/SD_ILS:591001
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Morales, Carlos author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003546207">https://www.taylorfrancis.com/books/9781003546207</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity game master : from role playing games to tabletop exercises that engage and inspire
ent://SD_ILS/0/SD_ILS:567883
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Dillon, Roberto, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606314">https://www.taylorfrancis.com/books/9781003606314</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Behavioral insights in cybersecurity : a guide to digital human factors
ent://SD_ILS/0/SD_ILS:567885
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Sachs, Dustin S., author.<br/>Preferred Shelf Number ZA3086.5 .C93<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed security monitoring and resilient cooperative control
ent://SD_ILS/0/SD_ILS:567906
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Wen, Guanghui, 1983- author. Lv, Yuezu, 1991- author. Zhao, Dan, author. Lei, Xuqiang, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003669913">https://www.taylorfrancis.com/books/9781003669913</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing security : strategies and best practices
ent://SD_ILS/0/SD_ILS:572633
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Agrawal, Neha author. Kumar, Rohit (Computer scientist), author. Tapaswi, Shashikala, author.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510772">https://www.taylorfrancis.com/books/9781003510772</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CISO 3.0 a guide to next-generation cybersecurity leadership.
ent://SD_ILS/0/SD_ILS:572634
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author POWELL, WALT.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510789">https://www.taylorfrancis.com/books/9781003510789</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Traditional vs generative AI pentesting : a hands-on approach to hacking
ent://SD_ILS/0/SD_ILS:574696
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Maleh, Yassine, 1987- author.<br/>Preferred Shelf Number Q335<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640318">https://www.taylorfrancis.com/books/9781003640318</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transforming cybersecurity with machine learning
ent://SD_ILS/0/SD_ILS:575637
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Thakur, Kutub, author. Pathan, Al-Sakib Khan, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003688327">https://www.taylorfrancis.com/books/9781003688327</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing sexuality : emerging issues at the intersection of intimacy and technology
ent://SD_ILS/0/SD_ILS:567730
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Goerlich, Stefani, author. Goerlich, J. Wolfgang, author.<br/>Preferred Shelf Number HQ66<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003391128">https://www.taylorfrancis.com/books/9781003391128</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure detection and control in cyber-physical systems : working in the presence of malicious data
ent://SD_ILS/0/SD_ILS:574476
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Yan, Jiaqi, author. Mo, Yilin, author. Wen, Changyun, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409199">https://www.taylorfrancis.com/books/9781003409199</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics in next generation internet for medical things : balancing security and sustainability
ent://SD_ILS/0/SD_ILS:575627
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Saini, Hemant Kumar, editor Rani, Sita, editor Ouaissa, Mariya, editor Ouaissa, Mariyam, editor Abou El Houda, Zakaria, editor<br/>Preferred Shelf Number R859.7 .I59 D54 2026 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640325">https://www.taylorfrancis.com/books/9781003640325</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
GUARDIANS OF THE DIGITAL AGE a time-traveling hacker's journey to protecting kids online.
ent://SD_ILS/0/SD_ILS:565844
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Biren, Elcin.<br/>Preferred Shelf Number PR9160.9 .B57<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003501626">https://www.taylorfrancis.com/books/9781003501626</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI-driven cybersecurity : revolutionizing threat detection and defence systems
ent://SD_ILS/0/SD_ILS:568870
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Razavi, Hooman, editor. Ouaissa, Mariya, editor. Ouaissa, Mariyam, editor. Nakouri, Hai??fa, editor. Abdelgawad, Ahmed, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003631507">https://www.taylorfrancis.com/books/9781003631507</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
HUMAN FACTORS AND CYBERSECURITY the psychology of online safety and security.
ent://SD_ILS/0/SD_ILS:588164
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hadlington, Lee.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003509011">https://www.taylorfrancis.com/books/9781003509011</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberterrorism : the rise of misinformation and disinformation
ent://SD_ILS/0/SD_ILS:592927
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number HM1231<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003642374">https://www.taylorfrancis.com/books/9781003642374</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
NEW PERSPECTIVES IN BEHAVIORAL CYBERSECURITY II human behavior for.
ent://SD_ILS/0/SD_ILS:560113
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Preferred Shelf Number ZA3086.5 .C93<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003599142">https://www.taylorfrancis.com/books/9781003599142</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURING TALENT building and retaining high-performance cybersecurity teams.
ent://SD_ILS/0/SD_ILS:567801
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author McLaughlin, Kevin (Kevin Lynn)<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003462064">https://www.taylorfrancis.com/books/9781003462064</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY 2050 protecting humanity in a hyper-connected world.
ent://SD_ILS/0/SD_ILS:551469
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author MERAT, SOORENA.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003641506">https://www.taylorfrancis.com/books/9781003641506</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ATTACKS ON ARTIFICIAL INTELLIGENCE the new facets of cyber.
ent://SD_ILS/0/SD_ILS:552313
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498827">https://www.taylorfrancis.com/books/9781003498827</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Systematic security : a CISO's playbook
ent://SD_ILS/0/SD_ILS:552414
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Qader, Timur author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003616528">https://www.taylorfrancis.com/books/9781003616528</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DIGITAL ENVIRONMENT AND SMALL STATES IN EUROPE challenges, threats, and.
ent://SD_ILS/0/SD_ILS:553348
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Preferred Shelf Number JC365<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003594796">https://www.taylorfrancis.com/books/9781003594796</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integrated assurance : unified risk strategy
ent://SD_ILS/0/SD_ILS:562998
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hayes, Patrick author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562153">https://www.taylorfrancis.com/books/9781003562153</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
EMBEDDED SOFTWARE DEVELOPMENT FOR SAFETY-CRITICAL SYSTEMS
ent://SD_ILS/0/SD_ILS:563010
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hobbs, Chris (Christopher W.)<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003598145">https://www.taylorfrancis.com/books/9781003598145</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building effective privacy programs : cybersecurity from principles to practice
ent://SD_ILS/0/SD_ILS:600111
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .P735 E34 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Defense in depth : modern cybersecurity strategies and evolving threats
ent://SD_ILS/0/SD_ILS:600191
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Zangana, Hewa Majeed, 1987- editor.<br/>Preferred Shelf Number QA76.9 .A25 D44 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital immune system : principles and practices
ent://SD_ILS/0/SD_ILS:600243
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Priyambada Dash, Sujata, editor. Mishra, Vaibhav. Shaw, Bijeta. Panda, Sandeep Kumar. Balamurugan, S.<br/>Preferred Shelf Number QA76.9 .A25 D54 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safeguarding satellite communications : issues, challenges, and solutions
ent://SD_ILS/0/SD_ILS:600245
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author An, Jianpin, author.<br/>Preferred Shelf Number TK5104 .A53 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Wiley handbook of art therapy
ent://SD_ILS/0/SD_ILS:600264
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gussak, David, editor. Rosal, Marcia L., editor.<br/>Preferred Shelf Number RC489 .A7 W55 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI security : defense, threats, and vulnerabilities
ent://SD_ILS/0/SD_ILS:600294
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Rana, Shaila, author. Chicone, Rhonda, author.<br/>Preferred Shelf Number Q335 .R36 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep learning for intrusion detection : techniques and applications
ent://SD_ILS/0/SD_ILS:600319
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Masoodi, Faheem Syeed, editor. Bamhdi, Alwi, editor.<br/>Preferred Shelf Number TK5105.59 .D44 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer memories 1 : core concepts
ent://SD_ILS/0/SD_ILS:600350
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Darche, Philippe, author.<br/>Preferred Shelf Number TK7895 .M4 D37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DIGITAL RESILIENCE, CYBERSECURITY AND SUPPLY CHAINS
ent://SD_ILS/0/SD_ILS:554348
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Singh, Tarnveer.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604969">https://www.taylorfrancis.com/books/9781003604969</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
NAVIGATING SUPPLY CHAIN CYBER RISK a comprehensive guide to managing third party... cyber risk.
ent://SD_ILS/0/SD_ILS:572684
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Evans, Ariel, author. Singh, Ajay (Cybersecurity professional) Golbin, Alex.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003581321">https://www.taylorfrancis.com/books/9781003581321</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
MASTERING CYBERSECURITY a practical guide for professionals. Volume 1.
ent://SD_ILS/0/SD_ILS:579460
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bhardwaj, Akashdeep.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003542520">https://www.taylorfrancis.com/books/9781003542520</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures. Protecting health information
ent://SD_ILS/0/SD_ILS:580393
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number R864<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527213">https://www.taylorfrancis.com/books/9781003527213</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The art of cyber defense : from risk assessment to threat intelligence
ent://SD_ILS/0/SD_ILS:586305
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Baddi, Youssef, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714806">https://www.taylorfrancis.com/books/9781032714806</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ADVANCED TECHNIQUES FOR ANOMALY DETECTION beyond the basics.
ent://SD_ILS/0/SD_ILS:591956
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Wahid, Abdul. Donta, Praveen Kumar.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003463559">https://www.taylorfrancis.com/books/9781003463559</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The CISO playbook
ent://SD_ILS/0/SD_ILS:587117
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Andreu, Andres, 1968- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003477556">https://www.taylorfrancis.com/books/9781003477556</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Defence : Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics
ent://SD_ILS/0/SD_ILS:587286
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kumar, Ahlad, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714813">https://www.taylorfrancis.com/books/9781032714813</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security technologies for law enforcement agencies
ent://SD_ILS/0/SD_ILS:589138
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Duraklar, Kazım author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Relationship Management : Leveraging Marketing Concepts to Advance a Cybersecurity Program
ent://SD_ILS/0/SD_ILS:589139
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Parrish, Lee, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597483">https://www.taylorfrancis.com/books/9781003597483</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Robotic Autonomous Vehicles : Machine Learning Applications to Detect Cyber Attacks
ent://SD_ILS/0/SD_ILS:588209
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Alruwaili, Ahmed, author. Islam, Sardar M. N., 1950- author. Gondal, Iqbāl, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003610908">https://www.taylorfrancis.com/books/9781003610908</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Communication Devices, Networks and Computing Models. Volume 2
ent://SD_ILS/0/SD_ILS:580449
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kumar, Budati Anil editor Ramakrishna, Akella editor Makkena, Goutham editor Ghinea, Gheorghita, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003591788">https://www.taylorfrancis.com/books/9781003591788</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI-Enabled Threat Intelligence and Cyber Risk Assessment
ent://SD_ILS/0/SD_ILS:582312
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Martiri, Edlira, editor Vajjhala, Narasimha, 1978- editor. Dalipi, Fisnik, editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless ad-hoc and sensor networks : architecture, protocols, and applications
ent://SD_ILS/0/SD_ILS:582337
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Singh, Pawan, editor. Kumar, Sudesh (Computer scientist), editor. Gupta, Sachin Kumar, editor. Rai, Abhay Kumar, editor. Saif, Abdu, editor.<br/>Preferred Shelf Number TK5105.77<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003528982">https://www.taylorfrancis.com/books/9781003528982</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mastering deepfake technology : strategies for ethical management and security
ent://SD_ILS/0/SD_ILS:582507
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Taneja, Sanjay, editor. Chitkara, Swati Gupta, editor. Kukreti, Mohit, editor. Chauan, Abhishek Singh, editor.<br/>Preferred Shelf Number Q335 .M37 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788743801146">https://www.taylorfrancis.com/books/9788743801146</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBER GOVERNANCE IN CHINA balancing state centrism and collaborative dynamics.
ent://SD_ILS/0/SD_ILS:584280
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author CAI, CUIHONG.<br/>Preferred Shelf Number KNQ80 .C65<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514473">https://www.taylorfrancis.com/books/9781003514473</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RECENT ADVANCES IN INTERNET OF THINGS SECURITY
ent://SD_ILS/0/SD_ILS:584310
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Azrour, Mourade. Mabrouki, Jamal.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587552">https://www.taylorfrancis.com/books/9781003587552</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : AI and governance
ent://SD_ILS/0/SD_ILS:584311
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37 .K57 2025 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : third party risk management
ent://SD_ILS/0/SD_ILS:584312
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37 .K57 2025 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and privacy of cyber-physical systems : emerging trends, technologies, and applications
ent://SD_ILS/0/SD_ILS:584418
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Imoize, Agbotiname Lucky, editor. Montlouis, Webert, editor. Popoola, Segun I., editor. Hammoudeh, Mohammad, editor.<br/>Preferred Shelf Number QA76.9 .A25 S43 2025 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788743801306">https://www.taylorfrancis.com/books/9788743801306</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global governance of space cyber security : regulatory and institutional aspects
ent://SD_ILS/0/SD_ILS:591021
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Li, Du, 1984- author.<br/>Preferred Shelf Number K564 .C6<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003561996">https://www.taylorfrancis.com/books/9781003561996</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
EFFECTS OF CYBER SUPPLY CHAIN ATTACKS & MITIGATION STRATEGIES
ent://SD_ILS/0/SD_ILS:591037
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Das, Ravindra.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585916">https://www.taylorfrancis.com/books/9781003585916</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ENTERPRISE FORTRESS the ultimate handbook for enterprise security architecture.
ent://SD_ILS/0/SD_ILS:591038
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Stevens, Alex.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585923">https://www.taylorfrancis.com/books/9781003585923</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and EU law : adopting the network and information security directive
ent://SD_ILS/0/SD_ILS:591167
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Karathanasis, Theodoros, author.<br/>Preferred Shelf Number KJE6071 .K39 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032722764">https://www.taylorfrancis.com/books/9781032722764</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security
ent://SD_ILS/0/SD_ILS:599222
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Brooks, Chuck (Writer of Inside cyber), author.<br/>Preferred Shelf Number HC79 .T4 B735 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging threats and countermeasures in cybersecurity
ent://SD_ILS/0/SD_ILS:599561
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Preferred Shelf Number QA76.9 .A25 E44 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Alice and Bob learn secure coding
ent://SD_ILS/0/SD_ILS:599664
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Janca, Tanya. author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimizing biofuel production with artificial intelligence
ent://SD_ILS/0/SD_ILS:599901
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kuila, Arindam, editor. Kumar, Depak, editor.<br/>Preferred Shelf Number TP339 .O68 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and cybersecurity in healthcare
ent://SD_ILS/0/SD_ILS:599741
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Agrawal, Rashmi, editor.<br/>Preferred Shelf Number R859.7 .A78 A78 2025 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CISA certified information systems auditor practice tests : covers 2024-2025 exam objectives
ent://SD_ILS/0/SD_ILS:599955
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Grego, Peter H., author. Chapple, Mike, author.<br/>Preferred Shelf Number QA76.3 .G74 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394324460">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394324460</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI-based advanced optimization techniques for edge computing
ent://SD_ILS/0/SD_ILS:599834
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Mohit, Kumar, editor.<br/>Preferred Shelf Number QA76.583 .A33 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287062">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287062</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber recon : my life in cyber espionage and ransomware negotiation
ent://SD_ILS/0/SD_ILS:600081
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Minder, Kurtis, author.<br/>Preferred Shelf Number QA76.9 .A25 M56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
GUARDIANS OF DATA a comprehensive guide to digital data protection.
ent://SD_ILS/0/SD_ILS:554346
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Khidzir, Nik Zulkarnaen. Ahmed, Shekh Abdullah-Al-Musa.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604679">https://www.taylorfrancis.com/books/9781003604679</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY OF INDUSTRIAL INTERNET OF THINGS (IIOT)
ent://SD_ILS/0/SD_ILS:560917
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author BUJA, ATDHE.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003383253">https://www.taylorfrancis.com/books/9781003383253</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
THEORISING CYBER (IN)SECURITY information, materiality, and entropic security.
ent://SD_ILS/0/SD_ILS:561001
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Fouad, Noran Shafik.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003454113">https://www.taylorfrancis.com/books/9781003454113</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity handbook : a guide for board members and C-suite executives
ent://SD_ILS/0/SD_ILS:562071
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Young, Richard Gwashy author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003608059">https://www.taylorfrancis.com/books/9781003608059</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and machine learning in cybersecurity : a comprehensive guide to improving cybersecurity protocol
ent://SD_ILS/0/SD_ILS:571776
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Young, Richard Gwashy, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003615026">https://www.taylorfrancis.com/books/9781003615026</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:572623
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SAFEGUARDING THE FUTURE security and privacy by design for ai, metaverse, blockchain, and beyond.
ent://SD_ILS/0/SD_ILS:573480
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Tang, Alan.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003390695">https://www.taylorfrancis.com/books/9781003390695</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IoT-enabled health care systems : applications, benefits, and challenges
ent://SD_ILS/0/SD_ILS:576494
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kumar, Yatindra (Lecturer in electrical engineering), editor. Verma, Shashi Kant, editor. Singh, Archana (Lecturer in radiotherapy), editor. Kumar, Krishna (Engineer), editor Gupta, Manoj (Lecturer in computer science and engineering), editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003505235">https://www.taylorfrancis.com/books/9781003505235</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Time-Sensitive Systems.
ent://SD_ILS/0/SD_ILS:599899
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Choudhury, Tanupriy. Choudhury, Tanupriya/Singh, Rahul Kuma. Tomar, Ravi.<br/>Preferred Shelf Number TA168<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Rise of the machines : when AI and zero trust collide : a Project Zero Trust story
ent://SD_ILS/0/SD_ILS:599932
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Finney, George, author. Vinduska, Zach, author.<br/>Preferred Shelf Number QA76.9 .A25 F56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The confluence of cryptography, blockchain and artificial intelligence
ent://SD_ILS/0/SD_ILS:566001
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ankita. Nayancy. Verma, Rajat.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711515">https://www.taylorfrancis.com/books/9781032711515</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of AI-driven threat detection and prevention : a holistic approach
ent://SD_ILS/0/SD_ILS:569783
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bhambri, Pankaj, editor. Anand A., Jose, 1975- editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003521020">https://www.taylorfrancis.com/books/9781003521020</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber CISO marksmanship : hitting the mark in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:572793
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Dunham, Ken, author. Johnson, James (Chief Information Officer), author. McComb, Joseph, author. Elrod, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032720500">https://www.taylorfrancis.com/books/9781032720500</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human factors analysis of 23 cyberattacks
ent://SD_ILS/0/SD_ILS:574564
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Moallem, Abbas, author.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003461739">https://www.taylorfrancis.com/books/9781003461739</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimum spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:574605
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent cybersecurity and resilience for critical industries : challenges and applications
ent://SD_ILS/0/SD_ILS:575736
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Zaydi, Mounia, editor. Maleh, Yassine, 1987- editor. Chênevert, Gabriel, editor Zaydi, Hayat, editor El Yaagoubi, Amina, editor<br/>Preferred Shelf Number QA76.9 .A25 I58 2025 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770047746">https://www.taylorfrancis.com/books/9788770047746</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education
ent://SD_ILS/0/SD_ILS:575737
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Fowler, Bradley, 1968- author. Chaundy, Bruce G., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770047760">https://www.taylorfrancis.com/books/9788770047760</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBEROLOGY an optimized approach to the cyber world.
ent://SD_ILS/0/SD_ILS:577393
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Husain, Mohd Shahid, 1981-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409571">https://www.taylorfrancis.com/books/9781003409571</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safety Assurance under Uncertainties : From Software to Cyber-Physical/Machine Learning Systems
ent://SD_ILS/0/SD_ILS:578912
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hasuo, Ichiro editor Ishikawa, Fuyuki editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093350">https://www.taylorfrancis.com/books/9781003093350</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web hacking arsenal : a practical guide to modern web pentesting
ent://SD_ILS/0/SD_ILS:580250
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Baloch, Rafay, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003373568">https://www.taylorfrancis.com/books/9781003373568</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Agile security in the digital era : challenges and cybersecurity trends
ent://SD_ILS/0/SD_ILS:563898
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Zaydi, Mounia, editor.<br/>Preferred Shelf Number QA76.9 .A25 A414 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478676">https://www.taylorfrancis.com/books/9781003478676</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zero to hero : your guide to a career in cybersecurity
ent://SD_ILS/0/SD_ILS:565841
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Asare, Felix Kyei, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003501589">https://www.taylorfrancis.com/books/9781003501589</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN HEALTHCARE APPLICATIONS
ent://SD_ILS/0/SD_ILS:568919
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Poonkuntran, S., editor. Dhanaraj, Rajesh Kumar, editor. Aanjankumar, S., editor. Sathyamoorthy, Malathy, editor.<br/>Preferred Shelf Number R859.7 .S43<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711379">https://www.taylorfrancis.com/books/9781032711379</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
QUALITY ASSESSMENT AND SECURITY IN INDUSTRIAL INTERNET OF THINGS
ent://SD_ILS/0/SD_ILS:579452
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Jha, Sudan. Shakya, Sarbagya Ratna. Ahmad, Sultan. Zhou, Zhaoxian.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003530572">https://www.taylorfrancis.com/books/9781003530572</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social Cyber Engineering and Advanced Security Algorithms
ent://SD_ILS/0/SD_ILS:588161
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Merat, Soorena, author. Almuhtadi, Wahab, author<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003500698">https://www.taylorfrancis.com/books/9781003500698</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A Cybersecurity Leader's Journey : Speaking the Language of the Board
ent://SD_ILS/0/SD_ILS:588198
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Marchewka, Edward, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597407">https://www.taylorfrancis.com/books/9781003597407</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBER SECURITY IN THE AGE OF ARTIFICIAL INTELLIGENCE AND AUTONOMOUS weapons
ent://SD_ILS/0/SD_ILS:588996
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Erendor, Mehmet Emin.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003441700">https://www.taylorfrancis.com/books/9781003441700</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing : a journey into the next frontier of information and communication security
ent://SD_ILS/0/SD_ILS:589045
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hammoudeh, Mohammad, editor. Essa, Abdullah T., editor. Sherbeeni, Amro M., editor. Firth, Clinton M., editor. Essa, Abdullah S. (Abdullah Saad) editor.<br/>Preferred Shelf Number QA76.889<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003475286">https://www.taylorfrancis.com/books/9781003475286</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ADVANCEMENTS IN CYBERSECURITY next-generation systems and.
ent://SD_ILS/0/SD_ILS:589110
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003546153">https://www.taylorfrancis.com/books/9781003546153</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber insecurity : examining the past, defining the future
ent://SD_ILS/0/SD_ILS:553423
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Leonas, Vladas, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032672601">https://www.taylorfrancis.com/books/9781032672601</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI and digital forensics
ent://SD_ILS/0/SD_ILS:557101
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number QA76.9 .A25 D345 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003469438">https://www.taylorfrancis.com/books/9781003469438</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software Vulnerability Discovery Process : Concepts and Applications
ent://SD_ILS/0/SD_ILS:557374
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Anand, Adarsh, author. Bhatt, Navneet, author. Alhazmi, Omar H., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770046176">https://www.taylorfrancis.com/books/9788770046176</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital education : security, readiness, and technology enhancement
ent://SD_ILS/0/SD_ILS:560183
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Susanto, Heru, 1977- editor Leu, Fang-Yie, editor Bakrī, Saʻd ʻAlī al-Ḥājj, editor Haghi, A. K., editor<br/>Preferred Shelf Number LB1028.57<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032670782">https://www.taylorfrancis.com/books/9781032670782</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity Culture
ent://SD_ILS/0/SD_ILS:565707
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bishop, Gulsebnem, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003368496">https://www.taylorfrancis.com/books/9781003368496</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in knowledge management : cyberthreats and solutions
ent://SD_ILS/0/SD_ILS:567827
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Vajjhala, Narasimha, 1978- editor. Strang, Kenneth David, 1962- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498094">https://www.taylorfrancis.com/books/9781003498094</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Humans and cyber security : how organizations can enhance resilience through human factors
ent://SD_ILS/0/SD_ILS:568695
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Widdowson, Amanda, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003427681">https://www.taylorfrancis.com/books/9781003427681</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and data science innovations for sustainable development of HEICC : healthcare, education, industry, cities and communities
ent://SD_ILS/0/SD_ILS:568917
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Murugan, Thangavel, 1989- editor. W., Jaisingh, 1978- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711300">https://www.taylorfrancis.com/books/9781032711300</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain technology for cyber defense, cybersecurity, and countermeasures : techniques, solutions, and applications
ent://SD_ILS/0/SD_ILS:570600
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kshetri, Naresh, editor. Pandey, Purnendu Shekhar, editor. Ahmed, Mohiuddin (Computer scientist), editor.<br/>Preferred Shelf Number QA76.9 .A25 B5845 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003449515">https://www.taylorfrancis.com/books/9781003449515</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Investigations of Smart Devices
ent://SD_ILS/0/SD_ILS:551443
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bhardwaj, Akashdeep, 1971-, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570387">https://www.taylorfrancis.com/books/9781003570387</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A reference manual for data privacy laws and cyber frameworks
ent://SD_ILS/0/SD_ILS:556234
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number K3264 .C65<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003496915">https://www.taylorfrancis.com/books/9781003496915</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PRIVACY IN VEHICULAR NETWORKS challenges and solutions.
ent://SD_ILS/0/SD_ILS:552331
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ma, Baihe. Wang, Xu. Ni, Wei. Liu, Ren Ping.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003518044">https://www.taylorfrancis.com/books/9781003518044</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCE
ent://SD_ILS/0/SD_ILS:553331
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570905">https://www.taylorfrancis.com/books/9781003570905</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity, cybercrimes, and smart emerging technologies : proceedings of the Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (CCSET 2023), Riyadh, Saudi Arabia, 5th-7th December, 2023
ent://SD_ILS/0/SD_ILS:553368
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (2nd : 2023 : Riyadh, Saudi Arabia), creator. Abd El-Latif, Ahmed A., 1984- editor. El-Affendi, Mohammed, 1971- editor. AlShara, Mohamed Ali, editor. Maleh, Yassine, 1987- editor.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003614197">https://www.taylorfrancis.com/books/9781003614197</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure health : a guide to cybersecurity for healthcare managers
ent://SD_ILS/0/SD_ILS:555253
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hammad, Mohamed, 1990- editor. Ali, Gauhar, editor. El-Affendi, Mohammed, 1971- editor. Maleh, Yassine, 1987- editor. Abd El-Latif, Ahmed A., 1984- editor.<br/>Preferred Shelf Number R858<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470038">https://www.taylorfrancis.com/books/9781003470038</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The hack is back : techniques to beat hackers at their own games
ent://SD_ILS/0/SD_ILS:558496
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Varsalone, Jesse, author. Haller, Christopher, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003033301">https://www.taylorfrancis.com/books/9781003033301</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
INTELLIGENT DATA DRIVEN TECHNIQUES FOR SECURITY OF DIGITAL ASSETS
ent://SD_ILS/0/SD_ILS:559167
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Rana, Arun Kumar.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003590439">https://www.taylorfrancis.com/books/9781003590439</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI : phishing and cybersecurity metrics
ent://SD_ILS/0/SD_ILS:562960
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003503781">https://www.taylorfrancis.com/books/9781003503781</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
BIOMETRIC TECHNOLOGY AND AUTHENTICATION biocryptography, and cloud-based architecture.
ent://SD_ILS/0/SD_ILS:562997
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Das, Ravindra.<br/>Preferred Shelf Number TK7882 .B56<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562146">https://www.taylorfrancis.com/books/9781003562146</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
NAVIGATING THE CYBER MAZE insights and humor on the digital frontier.
ent://SD_ILS/0/SD_ILS:563001
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Muhlert, Matthias.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562184">https://www.taylorfrancis.com/books/9781003562184</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Communication Devices, Networks and Computing Models. Volume 1
ent://SD_ILS/0/SD_ILS:563926
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kumar, Budati Anil, editor. Ramakrishna, Akella, editor. Makkena, Goutham, editor. Ghinea, Gheorghita, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003513445">https://www.taylorfrancis.com/books/9781003513445</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice
ent://SD_ILS/0/SD_ILS:599377
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Edwards, Jason (Cybersecurity expert), author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reinforcement learning for cyber operations : applications of artificial intelligence for penetration testing
ent://SD_ILS/0/SD_ILS:599600
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Rahman, Abdul (Executive), author.<br/>Preferred Shelf Number Q325.6 .R34 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394206483">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394206483</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Preferred Shelf Number QA76.9 .C65 N38 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Preferred Shelf Number QA76.9 .A25 N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Edge of intelligence : exploring the frontiers of AI at the edge
ent://SD_ILS/0/SD_ILS:599759
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Mahajan, Shubham, editor. Munirathinam, Sathyan, editor. Raj, Pethuru, editor.<br/>Preferred Shelf Number Q335 .E34 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing cyber-physical systems : fundamentals, applications and challenges
ent://SD_ILS/0/SD_ILS:600260
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ananthajothi, K., editor.<br/>Preferred Shelf Number TK5105.59 .S43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287765</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Preferred Shelf Number TK3001 .M37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communication networks in smart power grids
ent://SD_ILS/0/SD_ILS:599871
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Zhou, Boyang, author.<br/>Preferred Shelf Number TK3105 .Z46 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The impact of algorithmic technologies on healthcare
ent://SD_ILS/0/SD_ILS:599726
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Dubey, Parul, editor Madankar, Mangala, editor Dubey, Pushkar, editor Hung, Bui Thanh, editor<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the digital frontier : threats and advanced techniques in security and forensics
ent://SD_ILS/0/SD_ILS:599732
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Sharma, Kavita, 1985- editor.<br/>Preferred Shelf Number QA76.9 .A25 S43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P76 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Taming the hacking storm : a framework for securing and defending networks
ent://SD_ILS/0/SD_ILS:599858
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY, PRIVACY, AND TRUST IN WBANS AND E HEALTHCARE
ent://SD_ILS/0/SD_ILS:552442
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Singh, Anuj Kumar. Kumar, Sachin (Computer scientist)<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032635101">https://www.taylorfrancis.com/books/9781032635101</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and business intelligence : innovations and machine learning for cyber risk management
ent://SD_ILS/0/SD_ILS:553989
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Abedin, Mohammad Zoynul, editor. Hájek, Petr, editor.<br/>Preferred Shelf Number HD38.7<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003285854">https://www.taylorfrancis.com/books/9781003285854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ZERO TRUST FRAMEWORK AND PRIVILEGED ACCESS MANAGEMENT (PAM)
ent://SD_ILS/0/SD_ILS:555252
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Das, Ravindra.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470021">https://www.taylorfrancis.com/books/9781003470021</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SPIES IN THE BITS AND BYTES the art of cyber threat intelligence.
ent://SD_ILS/0/SD_ILS:555303
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ali, Atif. Bhatti, Baber Majid.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504108">https://www.taylorfrancis.com/books/9781003504108</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kali Linux
ent://SD_ILS/0/SD_ILS:524304
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Altuntaş, Abdulaziz.<br/>Preferred Shelf Number QA76.9.A25 A48 2024<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:524308
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2024<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Blockchain-based cyber security applications and paradigms
ent://SD_ILS/0/SD_ILS:572494
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Shah, Kaushal, 1987- editor.<br/>Preferred Shelf Number QA76.9 .B56<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003389576">https://www.taylorfrancis.com/books/9781003389576</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big data, emerging technologies and intelligence : national security disrupted
ent://SD_ILS/0/SD_ILS:572498
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Hammond-Errey, Miah, author.<br/>Preferred Shelf Number JQ4029 .I6<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003389651">https://www.taylorfrancis.com/books/9781003389651</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Forensic perspectives on cybercrime : human behaviour and cybersecurity
ent://SD_ILS/0/SD_ILS:578172
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author McAlaney, John, 1979- author. Hills, Peter J. (Lecturer), author. Cole, Terri, author.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003300359">https://www.taylorfrancis.com/books/9781003300359</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY, LAW AND ECONOMICS the case of india
ent://SD_ILS/0/SD_ILS:576516
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Gagandeep Kaur (Professor of law)<br/>Preferred Shelf Number HV6773.3 .I4<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003517290">https://www.taylorfrancis.com/books/9781003517290</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CLOUD SECURITY concepts, applications and practices.
ent://SD_ILS/0/SD_ILS:582260
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Murthy, Jamuna S. Siddesh, G. M., 1981- Srinivasa, K. G.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003455448">https://www.taylorfrancis.com/books/9781003455448</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ransomware : penetration testing and contingency planning
ent://SD_ILS/0/SD_ILS:584139
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003431633">https://www.taylorfrancis.com/books/9781003431633</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:586024
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBER SECURITY FOR NEXT-GENERATION COMPUTING TECHNOLOGIES
ent://SD_ILS/0/SD_ILS:586025
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Khan, Inam Ullah. Ouaissa, Mariya. Ouaissa, Mariyam. Abou El Houda, Zakaria. Ijaz, Muhammad Fazal.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404361">https://www.taylorfrancis.com/books/9781003404361</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
BLOCKCHAIN AND MACHINE LEARNING FOR IOT SECURITY
ent://SD_ILS/0/SD_ILS:592780
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Azrour, Mourade. Mabrouki, Jamal. Guezzaz, Azidine. Benkirane, Said.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003438779">https://www.taylorfrancis.com/books/9781003438779</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The fusion of artificial intelligence and soft computing techniques for cybersecurity
ent://SD_ILS/0/SD_ILS:587080
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Jabbar, M. A. (PhD), editor. Tiwari, Sanju, 1979- editor. Pani, Subhendu Kumar, 1980- editor. Huang, Stephen (Lecturer in computer science), editor.<br/>Preferred Shelf Number XX(587080.1)<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003428503">https://www.taylorfrancis.com/books/9781003428503</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY OF DISCRETE EVENT SYSTEMS from smart attacks to resilient defence.
ent://SD_ILS/0/SD_ILS:587930
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Su, Rong.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003333883">https://www.taylorfrancis.com/books/9781003333883</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OFFENSIVE AND DEFENSIVE CYBER SECURITY STRATEGIES fundamentals, theory and practices.
ent://SD_ILS/0/SD_ILS:590041
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Ouaissa, Mariya. Ouaissa, Mariyam.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003509080">https://www.taylorfrancis.com/books/9781003509080</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
POLITICS OF CYBER-SECURITY
ent://SD_ILS/0/SD_ILS:591987
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Dunn Cavelty, Myriam.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497080">https://www.taylorfrancis.com/books/9781003497080</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fusion of artificial intelligence and machine learning in advanced image processing, data analysis, and cyber security
ent://SD_ILS/0/SD_ILS:581353
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Rana, Arun Kumar, editor.<br/>Preferred Shelf Number Q335<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003493570">https://www.taylorfrancis.com/books/9781003493570</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational intelligence applications in cyber security
ent://SD_ILS/0/SD_ILS:582316
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Khan, Suhel Ahmad, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514312">https://www.taylorfrancis.com/books/9781003514312</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
INSECURE DIGITAL FRONTIERS : navigating the global cybersecurity landscape
ent://SD_ILS/0/SD_ILS:582322
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Bhardwaj, Akashdeep, 1971-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003515395">https://www.taylorfrancis.com/books/9781003515395</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of security and privacy of AI-enabled healthcare systems and internet of medical things
ent://SD_ILS/0/SD_ILS:585039
2026-01-20T16:12:18Z
2026-01-20T16:12:18Z
Author Imoize, Agbotiname Lucky, editor. Balas, Valentina Emilia, editor. Solanki, Vijender Kumar, 1980- editor. Lee, Cheng-Chi, editor. Obaidat, Mohammad S. (Mohammad Salameh), 1952- editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003370321">https://www.taylorfrancis.com/books/9781003370321</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>