Search Results for Computer Security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026ps$003d300$0026isd$003dtrue?dt=list 2026-03-14T10:49:08Z Computer security handbook ent://SD_ILS/0/SD_ILS:10921 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Computer Security Research Group.<br/>Preferred Shelf Number&#160;HF 5548.2 C58177 1973<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer network security ent://SD_ILS/0/SD_ILS:595830 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Sadiqui, Ali.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Easttom, Chuck.<br/>Preferred Shelf Number&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Caldwell, Wilma, ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security basic ent://SD_ILS/0/SD_ILS:41083 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Russell, Deborah.&#160;Gangemi, G. T., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 R87 1991<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security solutions ent://SD_ILS/0/SD_ILS:32336 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hruska, Jan, 1957-&#160;Jackson, K. M., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.76.C6 H78 1990<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:165113 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical computer network security ent://SD_ILS/0/SD_ILS:61567 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hendry, Mike.<br/>Preferred Shelf Number&#160;TK 5105.59 H46 1995<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Elements of Computer Security ent://SD_ILS/0/SD_ILS:168393 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security risk management ent://SD_ILS/0/SD_ILS:32379 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Palmer, Ian C.&#160;Potter, G. A., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 P182 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:148884 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:313473 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Stallings, William.&#160;Brown, Lawrie<br/>Preferred Shelf Number&#160;QA76.9 S73 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:602382 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47549-8">https://doi.org/10.1007/978-3-031-47549-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:597739 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Z35 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:402651 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Daimi, Kevin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:459518 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:613418 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-55606-2">https://doi.org/10.1007/978-3-319-55606-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:331005 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:175855 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kizza, Joseph Migga. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-917-2">http://dx.doi.org/10.1007/978-1-84800-917-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;TK5105.59 .E62 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Statistical methods in computer security ent://SD_ILS/0/SD_ILS:546938 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Chen, William W. S.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S737 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420030884">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:314021 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number&#160;QA76.9.A25 B56 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A handbook of computer security ent://SD_ILS/0/SD_ILS:32378 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hearnden, K., ed. by<br/>Preferred Shelf Number&#160;QA 76.9.A25 H191 1990<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer Networks Data Communications, Internet and Security ent://SD_ILS/0/SD_ILS:601853 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Elahi, Ata. author.&#160;Cushman, Alex. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42018-4">https://doi.org/10.1007/978-3-031-42018-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of e-Systems and Computer Networks ent://SD_ILS/0/SD_ILS:236023 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Obaidat, Mohammad.&#160;Boudriga, Noureddine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511536700">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:165001 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Lee, D. T. editor.&#160;Shieh, S. P. editor.&#160;Tygar, J. D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Mathematics for the Digital Systems Engineer Essentials for Modern Cryptography, Computer Security and Communications Technology. ent://SD_ILS/0/SD_ILS:600431 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Mitchell, Chris J.<br/>Preferred Shelf Number&#160;XX(600431.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Management and Wireless Networks 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608220 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Daimi, Kevin. editor.&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094&#160;Deligiannidis, Leonidas. editor. (orcid)0009-0002-3674-0142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86637-1">https://doi.org/10.1007/978-3-031-86637-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:605052 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70896-1">https://doi.org/10.1007/978-3-031-70896-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605041 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70890-9">https://doi.org/10.1007/978-3-031-70890-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:605042 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70903-6">https://doi.org/10.1007/978-3-031-70903-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605040 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70879-4">https://doi.org/10.1007/978-3-031-70879-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:602346 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51479-1">https://doi.org/10.1007/978-3-031-51479-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602345 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50594-2">https://doi.org/10.1007/978-3-031-50594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602834 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Abie, Habtamu. editor. (orcid)0000-0003-0866-5050&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Verderame, Luca. editor. (orcid)0000-0001-7155-7429&#160;Cambiaso, Enrico. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54129-2">https://doi.org/10.1007/978-3-031-54129-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605157 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Minematsu, Kazuhiko. editor. (orcid)0000-0002-3427-6772&#160;Mimura, Mamoru. editor. (orcid)0000-0003-4323-9911&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-7737-2">https://doi.org/10.1007/978-981-97-7737-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 43rd International Conference, SAFECOMP 2024, Florence, Italy, September 18-20, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605082 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ceccarelli, Andrea. editor. (orcid)0000-0002-2291-2428&#160;Trapp, Mario. editor.&#160;Bondavalli, Andrea. editor. (orcid)0000-0001-7366-6530&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68606-1">https://doi.org/10.1007/978-3-031-68606-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605083 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ceccarelli, Andrea. editor. (orcid)0000-0002-2291-2428&#160;Trapp, Mario. editor.&#160;Bondavalli, Andrea. editor. (orcid)0000-0001-7366-6530&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68738-9">https://doi.org/10.1007/978-3-031-68738-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:602338 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51482-1">https://doi.org/10.1007/978-3-031-51482-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602337 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51476-0">https://doi.org/10.1007/978-3-031-51476-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602750 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor. (orcid)0000-0001-8792-0413&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54204-6">https://doi.org/10.1007/978-3-031-54204-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced computer science applications : recent trends in AI, machine learning, and network security ent://SD_ILS/0/SD_ILS:583149 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Singh, Karan, 1981- editor.&#160;Banda, Latha, 1983- editor.&#160;Manjul, Manisha, 1982- editor.<br/>Preferred Shelf Number&#160;Q335 .A38 2023<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003369066">https://www.taylorfrancis.com/books/9781003369066</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521115 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Shikata, Junji. editor.&#160;Kuzuno, Hiroki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41326-1">https://doi.org/10.1007/978-3-031-41326-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20-22, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521134 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Tonetta, Stefano. editor.&#160;Bitsch, Friedemann. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-40923-3">https://doi.org/10.1007/978-3-031-40923-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops ASSURE, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE, Toulouse, France, September 19, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521137 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Roy, Matthieu. editor.&#160;Bitsch, Friedemann. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-40953-0">https://doi.org/10.1007/978-3-031-40953-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2022 International Workshops CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&amp;SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520983 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Katsikas, Sokratis. editor. (orcid)&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Kalloniatis, Christos. editor. (orcid)&#160;Mylopoulos, John. editor.&#160;Pallas, Frank. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-25460-4">https://doi.org/10.1007/978-3-031-25460-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices ent://SD_ILS/0/SD_ILS:553601 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Alexandrou, Alex (Professor of information technology security), author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R438 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484666 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751&#160;Yagi, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483391 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814&#160;Ant&oacute;n, Annie. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 38th International Conference, SAFECOMP 2019, Turku, Finland, September 11&ndash;13, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483736 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331&#160;Troubitsyna, Elena. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26601-1">https://doi.org/10.1007/978-3-030-26601-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23&ndash;27, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484909 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Sako, Kazue. editor.&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23&ndash;27, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484910 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Sako, Kazue. editor.&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484867 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331&#160;Troubitsyna, Elena. editor.&#160;Gashi, Ilir. editor.&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, V&auml;ster&aring;s, Sweden, September 18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399783 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Skavhaug, Amund. editor.&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99229-7">https://doi.org/10.1007/978-3-319-99229-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400045 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X&#160;Kuty&#322;owski, Miros&#322;aw. editor. (orcid)0000-0003-3192-2430&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, V&auml;ster&aring;s, Sweden, September 19-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400344 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Skavhaug, Amund. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401940 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Education &ndash; Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399019 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:401907 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Petrenko, Sergei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399699 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399718 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400111 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Inomata, Atsuo. editor.&#160;Yasuda, Kan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402736 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201&#160;Campegiani, Paolo. editor.&#160;Czach&oacute;rski, Tadeusz. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Komnios, Ioannis. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> COMPUTER SECURITY LITERACY : staying safe in a digital world. ent://SD_ILS/0/SD_ILS:540788 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;JACOBSON, DOUGLAS.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429108129">https://www.taylorfrancis.com/books/9780429108129</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611601 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779&#160;Chida, Koji. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618102 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612752 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66266-4">https://doi.org/10.1007/978-3-319-66266-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616288 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617319 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Rak, Jacek. editor.&#160;Bay, John. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;Popyack, Leonard. editor.&#160;Skormin, Victor. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:615762 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Satapathy, Suresh Chandra. editor.&#160;Bhateja, Vikrant. editor. (orcid)0000-0002-3259-8874&#160;Raju, K. Srujan. editor. (orcid)0000-0001-5058-4313&#160;Janakiramaiah, B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3226-4">https://doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:615972 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66284-8">https://doi.org/10.1007/978-3-319-66284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:611623 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Askoxylakis, Ioannis. editor.&#160;Ioannidis, Sotiris. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meadows, Catherine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611429 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Skavhaug, Amund. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45480-1">https://doi.org/10.1007/978-3-319-45480-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:610832 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ogawa, Kazuto. editor.&#160;Yoshioka, Katsunari. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611434 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Skavhaug, Amund. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:615918 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Askoxylakis, Ioannis. editor.&#160;Ioannidis, Sotiris. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meadows, Catherine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518843 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tanaka, Keisuke. editor.&#160;Suga, Yuji. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-22425-1">https://doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519092 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Koornneef, Floor. editor.&#160;van Gulijk, Coen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24249-1">https://doi.org/10.1007/978-3-319-24249-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:519267 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Pernul, G&uuml;nther. editor.&#160;Y A Ryan, Peter. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24177-7">https://doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518827 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Pernul, G&uuml;nther. editor.&#160;Y A Ryan, Peter. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24174-6">https://doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519026 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Koornneef, Floor. editor.&#160;van Gulijk, Coen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24255-2">https://doi.org/10.1007/978-3-319-24255-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What Is Computer Science? An Information Security Perspective ent://SD_ILS/0/SD_ILS:488536 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Page, Daniel. author.&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:482801 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bondavalli, Andrea. editor.&#160;Di Giandomenico, Felicita. editor. (orcid)0000-0002-8760-7299&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10506-2">https://doi.org/10.1007/978-3-319-10506-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485676 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bondavalli, Andrea. editor.&#160;Ceccarelli, Andrea. editor.&#160;Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10557-4">https://doi.org/10.1007/978-3-319-10557-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335005 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bitsch, Friedemann. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Ka&acirc;niche, Mohamed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335098 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Sakiyama, Kazuo. editor.&#160;Terada, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335098.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197419 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197420 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197425 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197475 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hanaoka, Goichiro. editor.&#160;Yamauchi, Toshihiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197479 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Thampi, Sabu M. editor.&#160;Zomaya, Albert Y. editor.&#160;Strufe, Thorsten. editor.&#160;Alcaraz Calero, Jose M. editor.&#160;Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197586 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kim, Tai-hoon. editor.&#160;Stoica, Adrian. editor.&#160;Fang, Wai-chi. editor.&#160;Vasilakos, Thanos. editor.&#160;Villalba, Javier Garc&iacute;a. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35264-5">http://dx.doi.org/10.1007/978-3-642-35264-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197329 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Foresti, Sara. editor.&#160;Yung, Moti. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Preferred Shelf Number&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195856 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Iwata, Tetsu. editor.&#160;Nishigaki, Masakatsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195586 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Flammini, Francesco. editor.&#160;Bologna, Sandro. editor.&#160;Vittorini, Valeria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2011 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings ent://SD_ILS/0/SD_ILS:195458 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Atluri, Vijay. editor.&#160;Diaz, Claudia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23822-2">http://dx.doi.org/10.1007/978-3-642-23822-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:148980 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192988 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Gritzalis, Dimitris. editor.&#160;Preneel, Bart. editor.&#160;Theoharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15497-3">http://dx.doi.org/10.1007/978-3-642-15497-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192743 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14706-7">http://dx.doi.org/10.1007/978-3-642-14706-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193040 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Schoitsch, Erwin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190960 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Buth, Bettina. editor.&#160;Rabe, Gerd. editor.&#160;Seyfarth, Till. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190950 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Backes, Michael. editor.&#160;Ning, Peng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191078 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Mambo, Masahiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191425 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Datta, Anupam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security ent://SD_ILS/0/SD_ILS:188061 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Goodall, John R. editor.&#160;Conti, Gregory. editor.&#160;Ma, Kwan-Liu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188815 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Goodall, John R. editor.&#160;Conti, Gregory. editor.&#160;Ma, Kwan-Liu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188894 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Harrison, Michael D. editor.&#160;Sujan, Mark-Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189031 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Jajodia, Sushil. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189294 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Matsuura, Kanta. editor.&#160;Fujisaki, Eiichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:164757 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187283 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Biskup, Joachim. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187335 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Saglietti, Francesca. editor.&#160;Oster, Norbert. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187467 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Miyaji, Atsuko. editor.&#160;Kikuchi, Hiroaki. editor.&#160;Rannenberg, Kai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13&ndash;15, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187023 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187727 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Cervesato, Iliano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Data Mining for Computer Security Methods and Applications ent://SD_ILS/0/SD_ILS:175344 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Maloof, Marcus A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:166154 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;Mosdorf, Romuald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184859 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;G&oacute;rski, Janusz. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184783 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Gollmann, Dieter. editor.&#160;Meier, Jan. editor.&#160;Sabelfeld, Andrei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20&ndash;25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:166080 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ga&iuml;ti, Dominique. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185034 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Yoshiura, Hiroshi. editor.&#160;Sakurai, Kouichi. editor.&#160;Rannenberg, Kai. editor.&#160;Murayama, Yuko. editor.&#160;Kawamura, Shinichi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183066 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183068 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Winther, Rune. editor.&#160;Gran, Bj&oslash;rn Axel. editor.&#160;Dahll, Gustav. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:164931 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Piegat, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183052 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Vimercati, Sabrina de Capitani. editor.&#160;Syverson, Paul. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:165011 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced methods in computer security, biometric and artificial intelligence systems ent://SD_ILS/0/SD_ILS:109864 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Pejas, Jerzy, 1954-, ed.&#160;Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number&#160;QA76.9.A25 E545 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Advances in hardware design for security and trust ent://SD_ILS/0/SD_ILS:573623 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Vemuri, Ranga, editor.&#160;Emmert, John, editor.<br/>Preferred Shelf Number&#160;TK7870<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510949">https://www.taylorfrancis.com/books/9781003510949</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography. 1 ent://SD_ILS/0/SD_ILS:599697 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael.&#160;Rivain, Mattieu.&#160;O'Flynn, Colin.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Cryptography. 3 ent://SD_ILS/0/SD_ILS:599815 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 2 : Cryptanalysis and future directions ent://SD_ILS/0/SD_ILS:598806 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H53 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Cox, I. J. (Ingemar J.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:145553 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Qian, Yi, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asymmetric cryptography : primitives and protocols ent://SD_ILS/0/SD_ILS:598096 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Pointcheval, David, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A83 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The business of cyber : why you should question what your security team are telling you ent://SD_ILS/0/SD_ILS:592690 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Fagan, Peter (Writer on computer security), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003380962">https://www.taylorfrancis.com/books/9781003380962</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dark world : a book on the deep Dark Web ent://SD_ILS/0/SD_ILS:586022 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ali, Atif, author.&#160;Qasim, Muhammad (Computer security expert), author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404330">https://www.taylorfrancis.com/books/9781003404330</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Attribute-Based Encryption and Access Control ent://SD_ILS/0/SD_ILS:569930 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Huang, Dijiang.&#160;Dong, Qiuxiang.&#160;Zhu, Yan (Professor of computer security)<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781351210607">https://www.taylorfrancis.com/books/9781351210607</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the digital realm : advances in hardware and software security, communication, and forensics ent://SD_ILS/0/SD_ILS:576480 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Arif, Muhammad (Computer scientist), editor.&#160;Jaffar, M. Arfan, editor.&#160;Geman, Oana, editor.&#160;Abbasi, Waseem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497851">https://www.taylorfrancis.com/books/9781003497851</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NETWORK SECURITY AND DATA PRIVACY IN 6G COMMUNICATION trends, challenges, and applications. ent://SD_ILS/0/SD_ILS:589127 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kumar, Rajendra (Associate professor in computer science), editor.&#160;Jain, Vishal, 1983- editor.&#160;Ather, Danish, editor.&#160;Kukreja, Vinay, editor.&#160;Singhal, Manoj, editor.<br/>Preferred Shelf Number&#160;TK5103.252<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003583127">https://www.taylorfrancis.com/books/9781003583127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence technology in healthcare : security and privacy issues ent://SD_ILS/0/SD_ILS:574411 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Sharma, Neha (Computer scientist), editor.&#160;Srivastava, Durgesh (Computer scientist), editor.&#160;Sinwar, Deepak, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Security : Attacks, Techniques, Tools, and Challenges. ent://SD_ILS/0/SD_ILS:551724 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Mishra, Preeti (Computer scientist), author.&#160;Pilli, Emmanuel S. (Emmanuel Shubhakar), author.&#160;Joshi, R. C., author.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003004486">https://www.taylorfrancis.com/books/9781003004486</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security analytics for the internet of everything ent://SD_ILS/0/SD_ILS:560404 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ahmed, Mohiuddin (Computer scientist)&#160;Abu Barkat, Abu.&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003010463">https://www.taylorfrancis.com/books/9781003010463</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Traditional vs generative AI pentesting : a hands-on approach to hacking ent://SD_ILS/0/SD_ILS:574696 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Maleh, Yassine, 1987- author.<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640318">https://www.taylorfrancis.com/books/9781003640318</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The psychology of cybersecurity : hacking and the human mind ent://SD_ILS/0/SD_ILS:586224 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Singh, Tarnveer, author.&#160;Zheng, Sarah Y., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003610533">https://www.taylorfrancis.com/books/9781003610533</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> GUARDIANS OF THE DIGITAL AGE a time-traveling hacker's journey to protecting kids online. ent://SD_ILS/0/SD_ILS:565844 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Biren, Elcin.<br/>Preferred Shelf Number&#160;PR9160.9 .B57<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003501626">https://www.taylorfrancis.com/books/9781003501626</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-driven cybersecurity : revolutionizing threat detection and defence systems ent://SD_ILS/0/SD_ILS:568870 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Razavi, Hooman, editor.&#160;Ouaissa, Mariya, editor.&#160;Ouaissa, Mariyam, editor.&#160;Nakouri, Hai??fa, editor.&#160;Abdelgawad, Ahmed, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003631507">https://www.taylorfrancis.com/books/9781003631507</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing security : strategies and best practices ent://SD_ILS/0/SD_ILS:572633 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Agrawal, Neha author.&#160;Kumar, Rohit (Computer scientist), author.&#160;Tapaswi, Shashikala, author.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510772">https://www.taylorfrancis.com/books/9781003510772</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISO 3.0 a guide to next-generation cybersecurity leadership. ent://SD_ILS/0/SD_ILS:572634 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;POWELL, WALT.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510789">https://www.taylorfrancis.com/books/9781003510789</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure detection and control in cyber-physical systems : working in the presence of malicious data ent://SD_ILS/0/SD_ILS:574476 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Yan, Jiaqi, author.&#160;Mo, Yilin, author.&#160;Wen, Changyun, 1963- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409199">https://www.taylorfrancis.com/books/9781003409199</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark essentials : simplifying network security and troubleshooting ent://SD_ILS/0/SD_ILS:580421 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Soni, Arun, author.<br/>Preferred Shelf Number&#160;TK5105.55<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003539261">https://www.taylorfrancis.com/books/9781003539261</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero-trust learning : applications in modern network security ent://SD_ILS/0/SD_ILS:580582 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kaushal, Chetna, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781779643575">https://www.taylorfrancis.com/books/9781779643575</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International law and security in Indo-Pacific : strategic design for the region ent://SD_ILS/0/SD_ILS:552367 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Siekiera, Joanna, editor.<br/>Preferred Shelf Number&#160;KZA1146 .I53 I58 2026<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003545750">https://www.taylorfrancis.com/books/9781003545750</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technology, AI, and operational security in banking : mastering cybersecurity and tech risk management ent://SD_ILS/0/SD_ILS:573707 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Young, Richard Gwashy, author.<br/>Preferred Shelf Number&#160;HG1709<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003654742">https://www.taylorfrancis.com/books/9781003654742</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing a healthcare facility : a guide to implementing a comprehensive cybersecurity program for small to medium-sized facilities ent://SD_ILS/0/SD_ILS:573708 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Sliger, Derek, author.<br/>Preferred Shelf Number&#160;RA963<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003654797">https://www.taylorfrancis.com/books/9781003654797</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics in next generation internet for medical things : balancing security and sustainability ent://SD_ILS/0/SD_ILS:575627 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Saini, Hemant Kumar, editor&#160;Rani, Sita, editor&#160;Ouaissa, Mariya, editor&#160;Ouaissa, Mariyam, editor&#160;Abou El Houda, Zakaria, editor<br/>Preferred Shelf Number&#160;R859.7 .I59 D54 2026 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640325">https://www.taylorfrancis.com/books/9781003640325</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transforming cybersecurity with machine learning ent://SD_ILS/0/SD_ILS:575637 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Thakur, Kutub, author.&#160;Pathan, Al-Sakib Khan, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003688327">https://www.taylorfrancis.com/books/9781003688327</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HUMAN FACTORS AND CYBERSECURITY the psychology of online safety and security. ent://SD_ILS/0/SD_ILS:588164 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hadlington, Lee.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003509011">https://www.taylorfrancis.com/books/9781003509011</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum algorithms for enhancing cybersecurity in computational intelligence in healthcare ent://SD_ILS/0/SD_ILS:589137 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Singhal, Prateek, editor.&#160;Mishra, Pramod Kumar, editor.&#160;Hasan, Mokhtar Mohammed, editor.<br/>Preferred Shelf Number&#160;R858<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597414">https://www.taylorfrancis.com/books/9781003597414</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber risk management in practice : a guide to real-world solutions ent://SD_ILS/0/SD_ILS:591001 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Morales, Carlos author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003546207">https://www.taylorfrancis.com/books/9781003546207</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FROM SMART CITIES TO THE METAVERSE a journey through cybersecurity, ai, and Urban Sustainability. ent://SD_ILS/0/SD_ILS:591060 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003619819">https://www.taylorfrancis.com/books/9781003619819</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> State, security and cyberwar : the quest for digital peace ent://SD_ILS/0/SD_ILS:592919 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Singh, Thangjam K., author.&#160;Jha, Sanjay K., author.<br/>Preferred Shelf Number&#160;JC311<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003630319">https://www.taylorfrancis.com/books/9781003630319</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberterrorism : the rise of misinformation and disinformation ent://SD_ILS/0/SD_ILS:592927 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;HM1231<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003642374">https://www.taylorfrancis.com/books/9781003642374</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NEW PERSPECTIVES IN BEHAVIORAL CYBERSECURITY II human behavior for. ent://SD_ILS/0/SD_ILS:560113 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003599142">https://www.taylorfrancis.com/books/9781003599142</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated assurance : unified risk strategy ent://SD_ILS/0/SD_ILS:562998 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hayes, Patrick author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562153">https://www.taylorfrancis.com/books/9781003562153</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> EMBEDDED SOFTWARE DEVELOPMENT FOR SAFETY-CRITICAL SYSTEMS ent://SD_ILS/0/SD_ILS:563010 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hobbs, Chris (Christopher W.)<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003598145">https://www.taylorfrancis.com/books/9781003598145</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing sexuality : emerging issues at the intersection of intimacy and technology ent://SD_ILS/0/SD_ILS:567730 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Goerlich, Stefani, author.&#160;Goerlich, J. Wolfgang, author.<br/>Preferred Shelf Number&#160;HQ66<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003391128">https://www.taylorfrancis.com/books/9781003391128</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SECURING TALENT building and retaining high-performance cybersecurity teams. ent://SD_ILS/0/SD_ILS:567801 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;McLaughlin, Kevin (Kevin Lynn)<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003462064">https://www.taylorfrancis.com/books/9781003462064</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity game master : from role playing games to tabletop exercises that engage and inspire ent://SD_ILS/0/SD_ILS:567883 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Dillon, Roberto, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606314">https://www.taylorfrancis.com/books/9781003606314</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Behavioral insights in cybersecurity : a guide to digital human factors ent://SD_ILS/0/SD_ILS:567885 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Sachs, Dustin S., author.<br/>Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed security monitoring and resilient cooperative control ent://SD_ILS/0/SD_ILS:567906 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Wen, Guanghui, 1983- author.&#160;Lv, Yuezu, 1991- author.&#160;Zhao, Dan, author.&#160;Lei, Xuqiang, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003669913">https://www.taylorfrancis.com/books/9781003669913</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:539793 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY 2050 protecting humanity in a hyper-connected world. ent://SD_ILS/0/SD_ILS:551469 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;MERAT, SOORENA.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003641506">https://www.taylorfrancis.com/books/9781003641506</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ATTACKS ON ARTIFICIAL INTELLIGENCE the new facets of cyber. ent://SD_ILS/0/SD_ILS:552313 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498827">https://www.taylorfrancis.com/books/9781003498827</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Systematic security : a CISO's playbook ent://SD_ILS/0/SD_ILS:552414 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Qader, Timur author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003616528">https://www.taylorfrancis.com/books/9781003616528</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DIGITAL ENVIRONMENT AND SMALL STATES IN EUROPE challenges, threats, and. ent://SD_ILS/0/SD_ILS:553348 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Preferred Shelf Number&#160;JC365<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003594796">https://www.taylorfrancis.com/books/9781003594796</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent networks and systems : advanced technologies and applications ent://SD_ILS/0/SD_ILS:553413 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Siddique, N. H., editor.&#160;Arefin, Mohammad Shamsul, editor.&#160;Noori, Sheak Rashed Haider, editor.&#160;Kaiser, M. Shamim, editor.<br/>Preferred Shelf Number&#160;QA76.76 .E95<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032659770">https://www.taylorfrancis.com/books/9781032659770</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI security : defense, threats, and vulnerabilities ent://SD_ILS/0/SD_ILS:600294 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Rana, Shaila, author.&#160;Chicone, Rhonda, author.<br/>Preferred Shelf Number&#160;Q335 .R36 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Wiley handbook of art therapy ent://SD_ILS/0/SD_ILS:600264 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Gussak, David, editor.&#160;Rosal, Marcia L., editor.<br/>Preferred Shelf Number&#160;RC489 .A7 W55 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI for cybersecurity : fundamentals, applications, risks, and opportunities ent://SD_ILS/0/SD_ILS:584274 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Nguyen, Diep N., author.&#160;Vu, Ly T., author&#160;Nguyen, Quang Uy, author&#160;Hoang, Dinh Thai, 1986- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003502531">https://www.taylorfrancis.com/books/9781003502531</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> INDUSTRIAL INTERNET OF THINGS FOR RESPONSIBLE TECHNOLOGY ent://SD_ILS/0/SD_ILS:586208 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587903">https://www.taylorfrancis.com/books/9781003587903</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building effective privacy programs : cybersecurity from principles to practice ent://SD_ILS/0/SD_ILS:600111 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .P735 E34 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defense in depth : modern cybersecurity strategies and evolving threats ent://SD_ILS/0/SD_ILS:600191 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Zangana, Hewa Majeed, 1987- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital immune system : principles and practices ent://SD_ILS/0/SD_ILS:600243 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Priyambada Dash, Sujata, editor.&#160;Mishra, Vaibhav.&#160;Shaw, Bijeta.&#160;Panda, Sandeep Kumar.&#160;Balamurugan, S.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D54 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safeguarding satellite communications : issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:600245 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;An, Jianpin, author.<br/>Preferred Shelf Number&#160;TK5104 .A53 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep learning for intrusion detection : techniques and applications ent://SD_ILS/0/SD_ILS:600319 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Masoodi, Faheem Syeed, editor.&#160;Bamhdi, Alwi, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer memories 1 : core concepts ent://SD_ILS/0/SD_ILS:600350 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Darche, Philippe, author.<br/>Preferred Shelf Number&#160;TK7895 .M4 D37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT-enabled health care systems : applications, benefits, and challenges ent://SD_ILS/0/SD_ILS:576494 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kumar, Yatindra (Lecturer in electrical engineering), editor.&#160;Verma, Shashi Kant, editor.&#160;Singh, Archana (Lecturer in radiotherapy), editor.&#160;Kumar, Krishna (Engineer), editor&#160;Gupta, Manoj (Lecturer in computer science and engineering), editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003505235">https://www.taylorfrancis.com/books/9781003505235</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety Assurance under Uncertainties : From Software to Cyber-Physical/Machine Learning Systems ent://SD_ILS/0/SD_ILS:578912 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hasuo, Ichiro editor&#160;Ishikawa, Fuyuki editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093350">https://www.taylorfrancis.com/books/9781003093350</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : third party risk management ent://SD_ILS/0/SD_ILS:584312 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Defence : Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics ent://SD_ILS/0/SD_ILS:587286 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kumar, Ahlad, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714813">https://www.taylorfrancis.com/books/9781032714813</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Cybersecurity Leader's Journey : Speaking the Language of the Board ent://SD_ILS/0/SD_ILS:588198 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Marchewka, Edward, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597407">https://www.taylorfrancis.com/books/9781003597407</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Robotic Autonomous Vehicles : Machine Learning Applications to Detect Cyber Attacks ent://SD_ILS/0/SD_ILS:588209 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Alruwaili, Ahmed, author.&#160;Islam, Sardar M. N., 1950- author.&#160;Gondal, Iqb&#257;l, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003610908">https://www.taylorfrancis.com/books/9781003610908</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Cyber Engineering and Advanced Security Algorithms ent://SD_ILS/0/SD_ILS:588161 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Merat, Soorena, author.&#160;Almuhtadi, Wahab, author<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003500698">https://www.taylorfrancis.com/books/9781003500698</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBER SECURITY IN THE AGE OF ARTIFICIAL INTELLIGENCE AND AUTONOMOUS weapons ent://SD_ILS/0/SD_ILS:588996 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Erendor, Mehmet Emin.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003441700">https://www.taylorfrancis.com/books/9781003441700</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing : a journey into the next frontier of information and communication security ent://SD_ILS/0/SD_ILS:589045 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hammoudeh, Mohammad, editor.&#160;Essa, Abdullah T., editor.&#160;Sherbeeni, Amro M., editor.&#160;Firth, Clinton M., editor.&#160;Essa, Abdullah S. (Abdullah Saad) editor.<br/>Preferred Shelf Number&#160;QA76.889<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003475286">https://www.taylorfrancis.com/books/9781003475286</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ADVANCEMENTS IN CYBERSECURITY next-generation systems and. ent://SD_ILS/0/SD_ILS:589110 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003546153">https://www.taylorfrancis.com/books/9781003546153</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Relationship Management : Leveraging Marketing Concepts to Advance a Cybersecurity Program ent://SD_ILS/0/SD_ILS:589139 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Parrish, Lee, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597483">https://www.taylorfrancis.com/books/9781003597483</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DIGITAL RESILIENCE, CYBERSECURITY AND SUPPLY CHAINS ent://SD_ILS/0/SD_ILS:554348 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Singh, Tarnveer.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604969">https://www.taylorfrancis.com/books/9781003604969</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NAVIGATING SUPPLY CHAIN CYBER RISK a comprehensive guide to managing third party... cyber risk. ent://SD_ILS/0/SD_ILS:572684 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Evans, Ariel, author.&#160;Singh, Ajay (Cybersecurity professional)&#160;Golbin, Alex.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003581321">https://www.taylorfrancis.com/books/9781003581321</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber CISO marksmanship : hitting the mark in cybersecurity leadership ent://SD_ILS/0/SD_ILS:572793 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Dunham, Ken, author.&#160;Johnson, James (Chief Information Officer), author.&#160;McComb, Joseph, author.&#160;Elrod, Jason, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032720500">https://www.taylorfrancis.com/books/9781032720500</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human factors analysis of 23 cyberattacks ent://SD_ILS/0/SD_ILS:574564 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Moallem, Abbas, author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003461739">https://www.taylorfrancis.com/books/9781003461739</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent cybersecurity and resilience for critical industries : challenges and applications ent://SD_ILS/0/SD_ILS:575736 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Zaydi, Mounia, editor.&#160;Maleh, Yassine, 1987- editor.&#160;Ch&ecirc;nevert, Gabriel, editor&#160;Zaydi, Hayat, editor&#160;El Yaagoubi, Amina, editor<br/>Preferred Shelf Number&#160;QA76.9 .A25 I58 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770047746">https://www.taylorfrancis.com/books/9788770047746</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education ent://SD_ILS/0/SD_ILS:575737 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Fowler, Bradley, 1968- author.&#160;Chaundy, Bruce G., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770047760">https://www.taylorfrancis.com/books/9788770047760</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBEROLOGY an optimized approach to the cyber world. ent://SD_ILS/0/SD_ILS:577393 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Husain, Mohd Shahid, 1981-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409571">https://www.taylorfrancis.com/books/9781003409571</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> QUALITY ASSESSMENT AND SECURITY IN INDUSTRIAL INTERNET OF THINGS ent://SD_ILS/0/SD_ILS:579452 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Jha, Sudan.&#160;Shakya, Sarbagya Ratna.&#160;Ahmad, Sultan.&#160;Zhou, Zhaoxian.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003530572">https://www.taylorfrancis.com/books/9781003530572</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> MASTERING CYBERSECURITY a practical guide for professionals. Volume 1. ent://SD_ILS/0/SD_ILS:579460 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bhardwaj, Akashdeep.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003542520">https://www.taylorfrancis.com/books/9781003542520</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-Enabled Threat Intelligence and Cyber Risk Assessment ent://SD_ILS/0/SD_ILS:582312 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Martiri, Edlira, editor&#160;Vajjhala, Narasimha, 1978- editor.&#160;Dalipi, Fisnik, editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless ad-hoc and sensor networks : architecture, protocols, and applications ent://SD_ILS/0/SD_ILS:582337 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Singh, Pawan, editor.&#160;Kumar, Sudesh (Computer scientist), editor.&#160;Gupta, Sachin Kumar, editor.&#160;Rai, Abhay Kumar, editor.&#160;Saif, Abdu, editor.<br/>Preferred Shelf Number&#160;TK5105.77<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003528982">https://www.taylorfrancis.com/books/9781003528982</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mastering deepfake technology : strategies for ethical management and security ent://SD_ILS/0/SD_ILS:582507 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Taneja, Sanjay, editor.&#160;Chitkara, Swati Gupta, editor.&#160;Kukreti, Mohit, editor.&#160;Chauan, Abhishek Singh, editor.<br/>Preferred Shelf Number&#160;Q335 .M37 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788743801146">https://www.taylorfrancis.com/books/9788743801146</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> GUARDIANS OF DATA a comprehensive guide to digital data protection. ent://SD_ILS/0/SD_ILS:554346 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Khidzir, Nik Zulkarnaen.&#160;Ahmed, Shekh Abdullah-Al-Musa.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604679">https://www.taylorfrancis.com/books/9781003604679</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The hack is back : techniques to beat hackers at their own games ent://SD_ILS/0/SD_ILS:558496 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Varsalone, Jesse, author.&#160;Haller, Christopher, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003033301">https://www.taylorfrancis.com/books/9781003033301</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> INTELLIGENT DATA DRIVEN TECHNIQUES FOR SECURITY OF DIGITAL ASSETS ent://SD_ILS/0/SD_ILS:559167 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Rana, Arun Kumar.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003590439">https://www.taylorfrancis.com/books/9781003590439</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity handbook : a guide for board members and C-suite executives ent://SD_ILS/0/SD_ILS:562071 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Young, Richard Gwashy author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003608059">https://www.taylorfrancis.com/books/9781003608059</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero to hero : your guide to a career in cybersecurity ent://SD_ILS/0/SD_ILS:565841 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Asare, Felix Kyei, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003501589">https://www.taylorfrancis.com/books/9781003501589</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The confluence of cryptography, blockchain and artificial intelligence ent://SD_ILS/0/SD_ILS:566001 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ankita.&#160;Nayancy.&#160;Verma, Rajat.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711515">https://www.taylorfrancis.com/books/9781032711515</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Culture ent://SD_ILS/0/SD_ILS:565707 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bishop, Gulsebnem, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003368496">https://www.taylorfrancis.com/books/9781003368496</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and data science innovations for sustainable development of HEICC : healthcare, education, industry, cities and communities ent://SD_ILS/0/SD_ILS:568917 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Murugan, Thangavel, 1989- editor.&#160;W., Jaisingh, 1978- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711300">https://www.taylorfrancis.com/books/9781032711300</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN HEALTHCARE APPLICATIONS ent://SD_ILS/0/SD_ILS:568919 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Poonkuntran, S., editor.&#160;Dhanaraj, Rajesh Kumar, editor.&#160;Aanjankumar, S., editor.&#160;Sathyamoorthy, Malathy, editor.<br/>Preferred Shelf Number&#160;R859.7 .S43<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711379">https://www.taylorfrancis.com/books/9781032711379</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:572623 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SAFEGUARDING THE FUTURE security and privacy by design for ai, metaverse, blockchain, and beyond. ent://SD_ILS/0/SD_ILS:573480 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Tang, Alan.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003390695">https://www.taylorfrancis.com/books/9781003390695</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimum spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:574605 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures. Protecting health information ent://SD_ILS/0/SD_ILS:580393 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;R864<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527213">https://www.taylorfrancis.com/books/9781003527213</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Issues in Communication Devices, Networks and Computing Models. Volume 2 ent://SD_ILS/0/SD_ILS:580449 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kumar, Budati Anil editor&#160;Ramakrishna, Akella editor&#160;Makkena, Goutham editor&#160;Ghinea, Gheorghita, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003591788">https://www.taylorfrancis.com/books/9781003591788</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRIVACY IN VEHICULAR NETWORKS challenges and solutions. ent://SD_ILS/0/SD_ILS:552331 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Ma, Baihe.&#160;Wang, Xu.&#160;Ni, Wei.&#160;Liu, Ren Ping.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003518044">https://www.taylorfrancis.com/books/9781003518044</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure health : a guide to cybersecurity for healthcare managers ent://SD_ILS/0/SD_ILS:555253 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Hammad, Mohamed, 1990- editor.&#160;Ali, Gauhar, editor.&#160;El-Affendi, Mohammed, 1971- editor.&#160;Maleh, Yassine, 1987- editor.&#160;Abd El-Latif, Ahmed A., 1984- editor.<br/>Preferred Shelf Number&#160;R858<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470038">https://www.taylorfrancis.com/books/9781003470038</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Agile security in the digital era : challenges and cybersecurity trends ent://SD_ILS/0/SD_ILS:563898 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Zaydi, Mounia, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A414 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478676">https://www.taylorfrancis.com/books/9781003478676</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Issues in Communication Devices, Networks and Computing Models. Volume 1 ent://SD_ILS/0/SD_ILS:563926 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kumar, Budati Anil, editor.&#160;Ramakrishna, Akella, editor.&#160;Makkena, Goutham, editor.&#160;Ghinea, Gheorghita, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003513445">https://www.taylorfrancis.com/books/9781003513445</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and machine learning in cybersecurity : a comprehensive guide to improving cybersecurity protocol ent://SD_ILS/0/SD_ILS:571776 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Young, Richard Gwashy, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003615026">https://www.taylorfrancis.com/books/9781003615026</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web hacking arsenal : a practical guide to modern web pentesting ent://SD_ILS/0/SD_ILS:580250 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Baloch, Rafay, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003373568">https://www.taylorfrancis.com/books/9781003373568</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBER GOVERNANCE IN CHINA balancing state centrism and collaborative dynamics. ent://SD_ILS/0/SD_ILS:584280 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;CAI, CUIHONG.<br/>Preferred Shelf Number&#160;KNQ80 .C65<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514473">https://www.taylorfrancis.com/books/9781003514473</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security technologies for law enforcement agencies ent://SD_ILS/0/SD_ILS:589138 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Duraklar, Kaz&#305;m author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global governance of space cyber security : regulatory and institutional aspects ent://SD_ILS/0/SD_ILS:591021 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Li, Du, 1984- author.<br/>Preferred Shelf Number&#160;K564 .C6<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003561996">https://www.taylorfrancis.com/books/9781003561996</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> EFFECTS OF CYBER SUPPLY CHAIN ATTACKS &amp; MITIGATION STRATEGIES ent://SD_ILS/0/SD_ILS:591037 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585916">https://www.taylorfrancis.com/books/9781003585916</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ENTERPRISE FORTRESS the ultimate handbook for enterprise security architecture. ent://SD_ILS/0/SD_ILS:591038 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Stevens, Alex.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585923">https://www.taylorfrancis.com/books/9781003585923</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and EU law : adopting the network and information security directive ent://SD_ILS/0/SD_ILS:591167 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Karathanasis, Theodoros, author.<br/>Preferred Shelf Number&#160;KJE6071 .K39 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032722764">https://www.taylorfrancis.com/books/9781032722764</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ADVANCED TECHNIQUES FOR ANOMALY DETECTION beyond the basics. ent://SD_ILS/0/SD_ILS:591956 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Wahid, Abdul.&#160;Donta, Praveen Kumar.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003463559">https://www.taylorfrancis.com/books/9781003463559</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital education : security, readiness, and technology enhancement ent://SD_ILS/0/SD_ILS:560183 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Susanto, Heru, 1977- editor&#160;Leu, Fang-Yie, editor&#160;Bakr&#299;, Sa&#699;d &#699;Al&#299; al-&#7716;&#257;jj, editor&#160;Haghi, A. K., editor<br/>Preferred Shelf Number&#160;LB1028.57<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032670782">https://www.taylorfrancis.com/books/9781032670782</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY OF INDUSTRIAL INTERNET OF THINGS (IIOT) ent://SD_ILS/0/SD_ILS:560917 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;BUJA, ATDHE.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003383253">https://www.taylorfrancis.com/books/9781003383253</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> THEORISING CYBER (IN)SECURITY information, materiality, and entropic security. ent://SD_ILS/0/SD_ILS:561001 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Fouad, Noran Shafik.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003454113">https://www.taylorfrancis.com/books/9781003454113</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI : phishing and cybersecurity metrics ent://SD_ILS/0/SD_ILS:562960 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003503781">https://www.taylorfrancis.com/books/9781003503781</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> BIOMETRIC TECHNOLOGY AND AUTHENTICATION biocryptography, and cloud-based architecture. ent://SD_ILS/0/SD_ILS:562997 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;TK7882 .B56<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562146">https://www.taylorfrancis.com/books/9781003562146</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NAVIGATING THE CYBER MAZE insights and humor on the digital frontier. ent://SD_ILS/0/SD_ILS:563001 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Muhlert, Matthias.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562184">https://www.taylorfrancis.com/books/9781003562184</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in knowledge management : cyberthreats and solutions ent://SD_ILS/0/SD_ILS:567827 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Vajjhala, Narasimha, 1978- editor.&#160;Strang, Kenneth David, 1962- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498094">https://www.taylorfrancis.com/books/9781003498094</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Humans and cyber security : how organizations can enhance resilience through human factors ent://SD_ILS/0/SD_ILS:568695 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Widdowson, Amanda, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003427681">https://www.taylorfrancis.com/books/9781003427681</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of AI-driven threat detection and prevention : a holistic approach ent://SD_ILS/0/SD_ILS:569783 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bhambri, Pankaj, editor.&#160;Anand A., Jose, 1975- editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003521020">https://www.taylorfrancis.com/books/9781003521020</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain technology for cyber defense, cybersecurity, and countermeasures : techniques, solutions, and applications ent://SD_ILS/0/SD_ILS:570600 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kshetri, Naresh, editor.&#160;Pandey, Purnendu Shekhar, editor.&#160;Ahmed, Mohiuddin (Computer scientist), editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B5845 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003449515">https://www.taylorfrancis.com/books/9781003449515</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Investigations of Smart Devices ent://SD_ILS/0/SD_ILS:551443 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Bhardwaj, Akashdeep, 1971-, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570387">https://www.taylorfrancis.com/books/9781003570387</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCE ent://SD_ILS/0/SD_ILS:553331 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Trim, Peter R. J., author.&#160;Lee, Yang-Im, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570905">https://www.taylorfrancis.com/books/9781003570905</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity, cybercrimes, and smart emerging technologies : proceedings of the Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (CCSET 2023), Riyadh, Saudi Arabia, 5th-7th December, 2023 ent://SD_ILS/0/SD_ILS:553368 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (2nd : 2023 : Riyadh, Saudi Arabia), creator.&#160;Abd El-Latif, Ahmed A., 1984- editor.&#160;El-Affendi, Mohammed, 1971- editor.&#160;AlShara, Mohamed Ali, editor.&#160;Maleh, Yassine, 1987- editor.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003614197">https://www.taylorfrancis.com/books/9781003614197</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber insecurity : examining the past, defining the future ent://SD_ILS/0/SD_ILS:553423 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Leonas, Vladas, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032672601">https://www.taylorfrancis.com/books/9781032672601</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A reference manual for data privacy laws and cyber frameworks ent://SD_ILS/0/SD_ILS:556234 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;K3264 .C65<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003496915">https://www.taylorfrancis.com/books/9781003496915</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI and digital forensics ent://SD_ILS/0/SD_ILS:557101 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D345 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003469438">https://www.taylorfrancis.com/books/9781003469438</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Vulnerability Discovery Process : Concepts and Applications ent://SD_ILS/0/SD_ILS:557374 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Anand, Adarsh, author.&#160;Bhatt, Navneet, author.&#160;Alhazmi, Omar H., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770046176">https://www.taylorfrancis.com/books/9788770046176</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security ent://SD_ILS/0/SD_ILS:600371 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Masood, Tariq, author.&#160;Abdo, Jamil, author.&#160;Iqbal, Atif, author.<br/>Preferred Shelf Number&#160;TK3001 .M37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and cybersecurity in healthcare ent://SD_ILS/0/SD_ILS:599741 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Agrawal, Rashmi, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78 A78 2025 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Edge of intelligence : exploring the frontiers of AI at the edge ent://SD_ILS/0/SD_ILS:599759 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Mahajan, Shubham, editor.&#160;Munirathinam, Sathyan, editor.&#160;Raj, Pethuru, editor.<br/>Preferred Shelf Number&#160;Q335 .E34 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security ent://SD_ILS/0/SD_ILS:599222 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Brooks, Chuck (Writer of Inside cyber), author.<br/>Preferred Shelf Number&#160;HC79 .T4 B735 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice ent://SD_ILS/0/SD_ILS:599377 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Edwards, Jason (Cybersecurity expert), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394280391</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber recon : my life in cyber espionage and ransomware negotiation ent://SD_ILS/0/SD_ILS:600081 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Minder, Kurtis, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M56 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394334643</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the digital frontier : threats and advanced techniques in security and forensics ent://SD_ILS/0/SD_ILS:599732 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Sharma, Kavita, 1985- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RECENT ADVANCES IN INTERNET OF THINGS SECURITY ent://SD_ILS/0/SD_ILS:584310 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Azrour, Mourade.&#160;Mabrouki, Jamal.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587552">https://www.taylorfrancis.com/books/9781003587552</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : AI and governance ent://SD_ILS/0/SD_ILS:584311 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy of cyber-physical systems : emerging trends, technologies, and applications ent://SD_ILS/0/SD_ILS:584418 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Imoize, Agbotiname Lucky, editor.&#160;Montlouis, Webert, editor.&#160;Popoola, Segun I., editor.&#160;Hammoudeh, Mohammad, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S43 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788743801306">https://www.taylorfrancis.com/books/9788743801306</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The art of cyber defense : from risk assessment to threat intelligence ent://SD_ILS/0/SD_ILS:586305 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Baddi, Youssef, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714806">https://www.taylorfrancis.com/books/9781032714806</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO playbook ent://SD_ILS/0/SD_ILS:587117 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Andreu, Andres, 1968- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003477556">https://www.taylorfrancis.com/books/9781003477556</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC ent://SD_ILS/0/SD_ILS:599434 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Basta, Alfred, author.&#160;Basta, Nadine, author.&#160;Anwar, Waqar, author.&#160;Essar, Mohammad Ilyas, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Preferred Shelf Number&#160;QA76.9 .A25 E44 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reinforcement learning for cyber operations : applications of artificial intelligence for penetration testing ent://SD_ILS/0/SD_ILS:599600 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Rahman, Abdul (Executive), author.<br/>Preferred Shelf Number&#160;Q325.6 .R34 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394206483">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394206483</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital twins and cybersecurity : safeguarding the future of connected systems ent://SD_ILS/0/SD_ILS:599615 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Naveen, Palanichamy, author.&#160;Maheswar, R., author.&#160;Ragupathy, U.S., author.<br/>Preferred Shelf Number&#160;QA76.9 .C65 N38 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Janca, Tanya. author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The impact of algorithmic technologies on healthcare ent://SD_ILS/0/SD_ILS:599726 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Dubey, Parul, editor&#160;Madankar, Mangala, editor&#160;Dubey, Pushkar, editor&#160;Hung, Bui Thanh, editor<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-based advanced optimization techniques for edge computing ent://SD_ILS/0/SD_ILS:599834 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Mohit, Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.583 .A33 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287062">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394287062</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Taming the hacking storm : a framework for securing and defending networks ent://SD_ILS/0/SD_ILS:599858 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication networks in smart power grids ent://SD_ILS/0/SD_ILS:599871 2026-03-14T10:49:08Z 2026-03-14T10:49:08Z Author&#160;Zhou, Boyang, author.<br/>Preferred Shelf Number&#160;TK3105 .Z46 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>