Search Results for Computer Security. - Narrowed by: Online Library SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2026-03-18T16:49:17Z Computer network security ent://SD_ILS/0/SD_ILS:595830 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Sadiqui, Ali.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:165113 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elements of Computer Security ent://SD_ILS/0/SD_ILS:168393 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:148884 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:602382 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47549-8">https://doi.org/10.1007/978-3-031-47549-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:597739 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Z35 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:402651 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Daimi, Kevin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:459518 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:613418 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-55606-2">https://doi.org/10.1007/978-3-319-55606-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:331005 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:175855 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kizza, Joseph Migga. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-917-2">http://dx.doi.org/10.1007/978-1-84800-917-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;TK5105.59 .E62 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Statistical methods in computer security ent://SD_ILS/0/SD_ILS:546938 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chen, William W. S.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S737 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420030884">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computer Networks Data Communications, Internet and Security ent://SD_ILS/0/SD_ILS:601853 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Elahi, Ata. author.&#160;Cushman, Alex. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42018-4">https://doi.org/10.1007/978-3-031-42018-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of e-Systems and Computer Networks ent://SD_ILS/0/SD_ILS:236023 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Obaidat, Mohammad.&#160;Boudriga, Noureddine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511536700">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:165001 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Lee, D. T. editor.&#160;Shieh, S. P. editor.&#160;Tygar, J. D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Management and Wireless Networks 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608220 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Daimi, Kevin. editor.&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094&#160;Deligiannidis, Leonidas. editor. (orcid)0009-0002-3674-0142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86637-1">https://doi.org/10.1007/978-3-031-86637-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematics for the Digital Systems Engineer Essentials for Modern Cryptography, Computer Security and Communications Technology. ent://SD_ILS/0/SD_ILS:600431 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Mitchell, Chris J.<br/>Preferred Shelf Number&#160;XX(600431.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 43rd International Conference, SAFECOMP 2024, Florence, Italy, September 18-20, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605082 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ceccarelli, Andrea. editor. (orcid)0000-0002-2291-2428&#160;Trapp, Mario. editor.&#160;Bondavalli, Andrea. editor. (orcid)0000-0001-7366-6530&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68606-1">https://doi.org/10.1007/978-3-031-68606-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605083 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ceccarelli, Andrea. editor. (orcid)0000-0002-2291-2428&#160;Trapp, Mario. editor.&#160;Bondavalli, Andrea. editor. (orcid)0000-0001-7366-6530&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68738-9">https://doi.org/10.1007/978-3-031-68738-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:605052 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70896-1">https://doi.org/10.1007/978-3-031-70896-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605157 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Minematsu, Kazuhiko. editor. (orcid)0000-0002-3427-6772&#160;Mimura, Mamoru. editor. (orcid)0000-0003-4323-9911&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-7737-2">https://doi.org/10.1007/978-981-97-7737-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602337 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51476-0">https://doi.org/10.1007/978-3-031-51476-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:602338 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51482-1">https://doi.org/10.1007/978-3-031-51482-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602345 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50594-2">https://doi.org/10.1007/978-3-031-50594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:602346 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51479-1">https://doi.org/10.1007/978-3-031-51479-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602750 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor. (orcid)0000-0001-8792-0413&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54204-6">https://doi.org/10.1007/978-3-031-54204-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602834 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Abie, Habtamu. editor. (orcid)0000-0003-0866-5050&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Verderame, Luca. editor. (orcid)0000-0001-7155-7429&#160;Cambiaso, Enrico. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54129-2">https://doi.org/10.1007/978-3-031-54129-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605040 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70879-4">https://doi.org/10.1007/978-3-031-70879-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605041 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70890-9">https://doi.org/10.1007/978-3-031-70890-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:605042 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70903-6">https://doi.org/10.1007/978-3-031-70903-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced computer science applications : recent trends in AI, machine learning, and network security ent://SD_ILS/0/SD_ILS:583149 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Singh, Karan, 1981- editor.&#160;Banda, Latha, 1983- editor.&#160;Manjul, Manisha, 1982- editor.<br/>Preferred Shelf Number&#160;Q335 .A38 2023<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003369066">https://www.taylorfrancis.com/books/9781003369066</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521115 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Shikata, Junji. editor.&#160;Kuzuno, Hiroki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41326-1">https://doi.org/10.1007/978-3-031-41326-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2022 International Workshops CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&amp;SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520983 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Katsikas, Sokratis. editor. (orcid)&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Kalloniatis, Christos. editor. (orcid)&#160;Mylopoulos, John. editor.&#160;Pallas, Frank. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-25460-4">https://doi.org/10.1007/978-3-031-25460-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20-22, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521134 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Tonetta, Stefano. editor.&#160;Bitsch, Friedemann. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-40923-3">https://doi.org/10.1007/978-3-031-40923-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops ASSURE, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE, Toulouse, France, September 19, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521137 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Roy, Matthieu. editor.&#160;Bitsch, Friedemann. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-40953-0">https://doi.org/10.1007/978-3-031-40953-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices ent://SD_ILS/0/SD_ILS:553601 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Alexandrou, Alex (Professor of information technology security), author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R438 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483391 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814&#160;Ant&oacute;n, Annie. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 38th International Conference, SAFECOMP 2019, Turku, Finland, September 11&ndash;13, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483736 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331&#160;Troubitsyna, Elena. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26601-1">https://doi.org/10.1007/978-3-030-26601-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484867 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331&#160;Troubitsyna, Elena. editor.&#160;Gashi, Ilir. editor.&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23&ndash;27, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484910 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Sako, Kazue. editor.&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23&ndash;27, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484909 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Sako, Kazue. editor.&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484666 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751&#160;Yagi, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402736 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201&#160;Campegiani, Paolo. editor.&#160;Czach&oacute;rski, Tadeusz. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Komnios, Ioannis. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Education &ndash; Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399019 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399699 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399718 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400045 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X&#160;Kuty&#322;owski, Miros&#322;aw. editor. (orcid)0000-0003-3192-2430&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, V&auml;ster&aring;s, Sweden, September 19-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400344 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Skavhaug, Amund. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:401907 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Petrenko, Sergei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401940 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, V&auml;ster&aring;s, Sweden, September 18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399783 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Skavhaug, Amund. editor.&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99229-7">https://doi.org/10.1007/978-3-319-99229-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400111 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Inomata, Atsuo. editor.&#160;Yasuda, Kan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> COMPUTER SECURITY LITERACY : staying safe in a digital world. ent://SD_ILS/0/SD_ILS:540788 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;JACOBSON, DOUGLAS.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429108129">https://www.taylorfrancis.com/books/9780429108129</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611601 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779&#160;Chida, Koji. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612752 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66266-4">https://doi.org/10.1007/978-3-319-66266-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:615972 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66284-8">https://doi.org/10.1007/978-3-319-66284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618102 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:615762 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Satapathy, Suresh Chandra. editor.&#160;Bhateja, Vikrant. editor. (orcid)0000-0002-3259-8874&#160;Raju, K. Srujan. editor. (orcid)0000-0001-5058-4313&#160;Janakiramaiah, B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3226-4">https://doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617319 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Rak, Jacek. editor.&#160;Bay, John. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;Popyack, Leonard. editor.&#160;Skormin, Victor. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616288 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:610832 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ogawa, Kazuto. editor.&#160;Yoshioka, Katsunari. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611429 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Skavhaug, Amund. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45480-1">https://doi.org/10.1007/978-3-319-45480-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611434 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Skavhaug, Amund. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:615918 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Askoxylakis, Ioannis. editor.&#160;Ioannidis, Sotiris. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meadows, Catherine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:611623 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Askoxylakis, Ioannis. editor.&#160;Ioannidis, Sotiris. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meadows, Catherine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518827 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Pernul, G&uuml;nther. editor.&#160;Y A Ryan, Peter. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24174-6">https://doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518843 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tanaka, Keisuke. editor.&#160;Suga, Yuji. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-22425-1">https://doi.org/10.1007/978-3-319-22425-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519026 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Koornneef, Floor. editor.&#160;van Gulijk, Coen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24255-2">https://doi.org/10.1007/978-3-319-24255-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519092 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Koornneef, Floor. editor.&#160;van Gulijk, Coen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24249-1">https://doi.org/10.1007/978-3-319-24249-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:519267 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Pernul, G&uuml;nther. editor.&#160;Y A Ryan, Peter. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24177-7">https://doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What Is Computer Science? An Information Security Perspective ent://SD_ILS/0/SD_ILS:488536 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Page, Daniel. author.&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485676 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bondavalli, Andrea. editor.&#160;Ceccarelli, Andrea. editor.&#160;Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10557-4">https://doi.org/10.1007/978-3-319-10557-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:482801 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bondavalli, Andrea. editor.&#160;Di Giandomenico, Felicita. editor. (orcid)0000-0002-8760-7299&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10506-2">https://doi.org/10.1007/978-3-319-10506-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335005 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bitsch, Friedemann. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Ka&acirc;niche, Mohamed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335098 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Sakiyama, Kazuo. editor.&#160;Terada, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335098.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197329 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Foresti, Sara. editor.&#160;Yung, Moti. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197419 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197420 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197425 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197475 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Hanaoka, Goichiro. editor.&#160;Yamauchi, Toshihiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197479 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Thampi, Sabu M. editor.&#160;Zomaya, Albert Y. editor.&#160;Strufe, Thorsten. editor.&#160;Alcaraz Calero, Jose M. editor.&#160;Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197586 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kim, Tai-hoon. editor.&#160;Stoica, Adrian. editor.&#160;Fang, Wai-chi. editor.&#160;Vasilakos, Thanos. editor.&#160;Villalba, Javier Garc&iacute;a. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35264-5">http://dx.doi.org/10.1007/978-3-642-35264-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2011 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings ent://SD_ILS/0/SD_ILS:195458 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Atluri, Vijay. editor.&#160;Diaz, Claudia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23822-2">http://dx.doi.org/10.1007/978-3-642-23822-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195856 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Iwata, Tetsu. editor.&#160;Nishigaki, Masakatsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:148980 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195586 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Flammini, Francesco. editor.&#160;Bologna, Sandro. editor.&#160;Vittorini, Valeria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192743 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14706-7">http://dx.doi.org/10.1007/978-3-642-14706-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193040 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Schoitsch, Erwin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192988 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gritzalis, Dimitris. editor.&#160;Preneel, Bart. editor.&#160;Theoharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15497-3">http://dx.doi.org/10.1007/978-3-642-15497-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190950 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Backes, Michael. editor.&#160;Ning, Peng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190960 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Buth, Bettina. editor.&#160;Rabe, Gerd. editor.&#160;Seyfarth, Till. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191078 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Mambo, Masahiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191425 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Datta, Anupam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188815 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Goodall, John R. editor.&#160;Conti, Gregory. editor.&#160;Ma, Kwan-Liu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:164757 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security ent://SD_ILS/0/SD_ILS:188061 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Goodall, John R. editor.&#160;Conti, Gregory. editor.&#160;Ma, Kwan-Liu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188894 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Harrison, Michael D. editor.&#160;Sujan, Mark-Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189031 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Jajodia, Sushil. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189294 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Matsuura, Kanta. editor.&#160;Fujisaki, Eiichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187283 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Biskup, Joachim. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187335 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Saglietti, Francesca. editor.&#160;Oster, Norbert. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187467 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Miyaji, Atsuko. editor.&#160;Kikuchi, Hiroaki. editor.&#160;Rannenberg, Kai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13&ndash;15, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187023 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187727 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Cervesato, Iliano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184859 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;G&oacute;rski, Janusz. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Control and Engineering for Qos, Security and Mobility, V IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20&ndash;25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:166080 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ga&iuml;ti, Dominique. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-34827-8">http://dx.doi.org/10.1007/978-0-387-34827-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Data Mining for Computer Security Methods and Applications ent://SD_ILS/0/SD_ILS:175344 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Maloof, Marcus A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184783 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gollmann, Dieter. editor.&#160;Meier, Jan. editor.&#160;Sabelfeld, Andrei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185034 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Yoshiura, Hiroshi. editor.&#160;Sakurai, Kouichi. editor.&#160;Rannenberg, Kai. editor.&#160;Murayama, Yuko. editor.&#160;Kawamura, Shinichi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:166154 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;Mosdorf, Romuald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:164931 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Piegat, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183052 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Vimercati, Sabrina de Capitani. editor.&#160;Syverson, Paul. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183066 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183068 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Winther, Rune. editor.&#160;Gran, Bj&oslash;rn Axel. editor.&#160;Dahll, Gustav. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:165011 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in hardware design for security and trust ent://SD_ILS/0/SD_ILS:573623 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Vemuri, Ranga, editor.&#160;Emmert, John, editor.<br/>Preferred Shelf Number&#160;TK7870<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510949">https://www.taylorfrancis.com/books/9781003510949</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography. 1 ent://SD_ILS/0/SD_ILS:599697 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael.&#160;Rivain, Mattieu.&#160;O'Flynn, Colin.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Cryptography. 3 ent://SD_ILS/0/SD_ILS:599815 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 2 : Cryptanalysis and future directions ent://SD_ILS/0/SD_ILS:598806 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat intelligence ent://SD_ILS/0/SD_ILS:598051 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number&#160;TK5105.59 .L47 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hands on hacking ent://SD_ILS/0/SD_ILS:596316 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Hickey, Matthew (Computer security expert), author.&#160;Arcuri, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H53 2020 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:145553 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Qian, Yi, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Cox, I. J. (Ingemar J.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asymmetric cryptography : primitives and protocols ent://SD_ILS/0/SD_ILS:598096 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Pointcheval, David, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A83 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The business of cyber : why you should question what your security team are telling you ent://SD_ILS/0/SD_ILS:592690 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Fagan, Peter (Writer on computer security), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003380962">https://www.taylorfrancis.com/books/9781003380962</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dark world : a book on the deep Dark Web ent://SD_ILS/0/SD_ILS:586022 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ali, Atif, author.&#160;Qasim, Muhammad (Computer security expert), author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404330">https://www.taylorfrancis.com/books/9781003404330</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Attribute-Based Encryption and Access Control ent://SD_ILS/0/SD_ILS:569930 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Huang, Dijiang.&#160;Dong, Qiuxiang.&#160;Zhu, Yan (Professor of computer security)<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781351210607">https://www.taylorfrancis.com/books/9781351210607</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NETWORK SECURITY AND DATA PRIVACY IN 6G COMMUNICATION trends, challenges, and applications. ent://SD_ILS/0/SD_ILS:589127 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kumar, Rajendra (Associate professor in computer science), editor.&#160;Jain, Vishal, 1983- editor.&#160;Ather, Danish, editor.&#160;Kukreja, Vinay, editor.&#160;Singhal, Manoj, editor.<br/>Preferred Shelf Number&#160;TK5103.252<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003583127">https://www.taylorfrancis.com/books/9781003583127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the digital realm : advances in hardware and software security, communication, and forensics ent://SD_ILS/0/SD_ILS:576480 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Arif, Muhammad (Computer scientist), editor.&#160;Jaffar, M. Arfan, editor.&#160;Geman, Oana, editor.&#160;Abbasi, Waseem, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497851">https://www.taylorfrancis.com/books/9781003497851</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence technology in healthcare : security and privacy issues ent://SD_ILS/0/SD_ILS:574411 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Sharma, Neha (Computer scientist), editor.&#160;Srivastava, Durgesh (Computer scientist), editor.&#160;Sinwar, Deepak, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Security : Attacks, Techniques, Tools, and Challenges. ent://SD_ILS/0/SD_ILS:551724 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Mishra, Preeti (Computer scientist), author.&#160;Pilli, Emmanuel S. (Emmanuel Shubhakar), author.&#160;Joshi, R. C., author.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003004486">https://www.taylorfrancis.com/books/9781003004486</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security analytics for the internet of everything ent://SD_ILS/0/SD_ILS:560404 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ahmed, Mohiuddin (Computer scientist)&#160;Abu Barkat, Abu.&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003010463">https://www.taylorfrancis.com/books/9781003010463</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NEW PERSPECTIVES IN BEHAVIORAL CYBERSECURITY II human behavior for. ent://SD_ILS/0/SD_ILS:560113 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003599142">https://www.taylorfrancis.com/books/9781003599142</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated assurance : unified risk strategy ent://SD_ILS/0/SD_ILS:562998 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Hayes, Patrick author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562153">https://www.taylorfrancis.com/books/9781003562153</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> EMBEDDED SOFTWARE DEVELOPMENT FOR SAFETY-CRITICAL SYSTEMS ent://SD_ILS/0/SD_ILS:563010 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Hobbs, Chris (Christopher W.)<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003598145">https://www.taylorfrancis.com/books/9781003598145</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> GUARDIANS OF THE DIGITAL AGE a time-traveling hacker's journey to protecting kids online. ent://SD_ILS/0/SD_ILS:565844 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Biren, Elcin.<br/>Preferred Shelf Number&#160;PR9160.9 .B57<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003501626">https://www.taylorfrancis.com/books/9781003501626</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure detection and control in cyber-physical systems : working in the presence of malicious data ent://SD_ILS/0/SD_ILS:574476 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Yan, Jiaqi, author.&#160;Mo, Yilin, author.&#160;Wen, Changyun, 1963- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409199">https://www.taylorfrancis.com/books/9781003409199</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberterrorism : the rise of misinformation and disinformation ent://SD_ILS/0/SD_ILS:592927 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;HM1231<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003642374">https://www.taylorfrancis.com/books/9781003642374</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY 2050 protecting humanity in a hyper-connected world. ent://SD_ILS/0/SD_ILS:551469 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;MERAT, SOORENA.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003641506">https://www.taylorfrancis.com/books/9781003641506</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ATTACKS ON ARTIFICIAL INTELLIGENCE the new facets of cyber. ent://SD_ILS/0/SD_ILS:552313 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498827">https://www.taylorfrancis.com/books/9781003498827</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:539793 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> International law and security in Indo-Pacific : strategic design for the region ent://SD_ILS/0/SD_ILS:552367 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Siekiera, Joanna, editor.<br/>Preferred Shelf Number&#160;KZA1146 .I53 I58 2026<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003545750">https://www.taylorfrancis.com/books/9781003545750</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Systematic security : a CISO's playbook ent://SD_ILS/0/SD_ILS:552414 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Qader, Timur author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003616528">https://www.taylorfrancis.com/books/9781003616528</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DIGITAL ENVIRONMENT AND SMALL STATES IN EUROPE challenges, threats, and. ent://SD_ILS/0/SD_ILS:553348 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Preferred Shelf Number&#160;JC365<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003594796">https://www.taylorfrancis.com/books/9781003594796</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent networks and systems : advanced technologies and applications ent://SD_ILS/0/SD_ILS:553413 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Siddique, N. H., editor.&#160;Arefin, Mohammad Shamsul, editor.&#160;Noori, Sheak Rashed Haider, editor.&#160;Kaiser, M. Shamim, editor.<br/>Preferred Shelf Number&#160;QA76.76 .E95<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032659770">https://www.taylorfrancis.com/books/9781032659770</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing sexuality : emerging issues at the intersection of intimacy and technology ent://SD_ILS/0/SD_ILS:567730 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Goerlich, Stefani, author.&#160;Goerlich, J. Wolfgang, author.<br/>Preferred Shelf Number&#160;HQ66<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003391128">https://www.taylorfrancis.com/books/9781003391128</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SECURING TALENT building and retaining high-performance cybersecurity teams. ent://SD_ILS/0/SD_ILS:567801 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;McLaughlin, Kevin (Kevin Lynn)<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003462064">https://www.taylorfrancis.com/books/9781003462064</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity game master : from role playing games to tabletop exercises that engage and inspire ent://SD_ILS/0/SD_ILS:567883 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Dillon, Roberto, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606314">https://www.taylorfrancis.com/books/9781003606314</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Behavioral insights in cybersecurity : a guide to digital human factors ent://SD_ILS/0/SD_ILS:567885 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Sachs, Dustin S., author.<br/>Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed security monitoring and resilient cooperative control ent://SD_ILS/0/SD_ILS:567906 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Wen, Guanghui, 1983- author.&#160;Lv, Yuezu, 1991- author.&#160;Zhao, Dan, author.&#160;Lei, Xuqiang, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003669913">https://www.taylorfrancis.com/books/9781003669913</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technology, AI, and operational security in banking : mastering cybersecurity and tech risk management ent://SD_ILS/0/SD_ILS:573707 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Young, Richard Gwashy, author.<br/>Preferred Shelf Number&#160;HG1709<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003654742">https://www.taylorfrancis.com/books/9781003654742</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing a healthcare facility : a guide to implementing a comprehensive cybersecurity program for small to medium-sized facilities ent://SD_ILS/0/SD_ILS:573708 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Sliger, Derek, author.<br/>Preferred Shelf Number&#160;RA963<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003654797">https://www.taylorfrancis.com/books/9781003654797</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics in next generation internet for medical things : balancing security and sustainability ent://SD_ILS/0/SD_ILS:575627 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Saini, Hemant Kumar, editor&#160;Rani, Sita, editor&#160;Ouaissa, Mariya, editor&#160;Ouaissa, Mariyam, editor&#160;Abou El Houda, Zakaria, editor<br/>Preferred Shelf Number&#160;R859.7 .I59 D54 2026 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640325">https://www.taylorfrancis.com/books/9781003640325</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transforming cybersecurity with machine learning ent://SD_ILS/0/SD_ILS:575637 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Thakur, Kutub, author.&#160;Pathan, Al-Sakib Khan, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003688327">https://www.taylorfrancis.com/books/9781003688327</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI for cybersecurity : fundamentals, applications, risks, and opportunities ent://SD_ILS/0/SD_ILS:584274 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Nguyen, Diep N., author.&#160;Vu, Ly T., author&#160;Nguyen, Quang Uy, author&#160;Hoang, Dinh Thai, 1986- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003502531">https://www.taylorfrancis.com/books/9781003502531</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-driven cybersecurity : revolutionizing threat detection and defence systems ent://SD_ILS/0/SD_ILS:568870 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Razavi, Hooman, editor.&#160;Ouaissa, Mariya, editor.&#160;Ouaissa, Mariyam, editor.&#160;Nakouri, Hai??fa, editor.&#160;Abdelgawad, Ahmed, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003631507">https://www.taylorfrancis.com/books/9781003631507</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing security : strategies and best practices ent://SD_ILS/0/SD_ILS:572633 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Agrawal, Neha author.&#160;Kumar, Rohit (Computer scientist), author.&#160;Tapaswi, Shashikala, author.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510772">https://www.taylorfrancis.com/books/9781003510772</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISO 3.0 a guide to next-generation cybersecurity leadership. ent://SD_ILS/0/SD_ILS:572634 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;POWELL, WALT.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510789">https://www.taylorfrancis.com/books/9781003510789</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Traditional vs generative AI pentesting : a hands-on approach to hacking ent://SD_ILS/0/SD_ILS:574696 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Maleh, Yassine, 1987- author.<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640318">https://www.taylorfrancis.com/books/9781003640318</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI security : defense, threats, and vulnerabilities ent://SD_ILS/0/SD_ILS:600294 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Rana, Shaila, author.&#160;Chicone, Rhonda, author.<br/>Preferred Shelf Number&#160;Q335 .R36 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394368532</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep learning for intrusion detection : techniques and applications ent://SD_ILS/0/SD_ILS:600319 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Masoodi, Faheem Syeed, editor.&#160;Bamhdi, Alwi, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum algorithms for enhancing cybersecurity in computational intelligence in healthcare ent://SD_ILS/0/SD_ILS:589137 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Singhal, Prateek, editor.&#160;Mishra, Pramod Kumar, editor.&#160;Hasan, Mokhtar Mohammed, editor.<br/>Preferred Shelf Number&#160;R858<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597414">https://www.taylorfrancis.com/books/9781003597414</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber risk management in practice : a guide to real-world solutions ent://SD_ILS/0/SD_ILS:591001 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Morales, Carlos author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003546207">https://www.taylorfrancis.com/books/9781003546207</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FROM SMART CITIES TO THE METAVERSE a journey through cybersecurity, ai, and Urban Sustainability. ent://SD_ILS/0/SD_ILS:591060 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003619819">https://www.taylorfrancis.com/books/9781003619819</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> State, security and cyberwar : the quest for digital peace ent://SD_ILS/0/SD_ILS:592919 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Singh, Thangjam K., author.&#160;Jha, Sanjay K., author.<br/>Preferred Shelf Number&#160;JC311<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003630319">https://www.taylorfrancis.com/books/9781003630319</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building effective privacy programs : cybersecurity from principles to practice ent://SD_ILS/0/SD_ILS:600111 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .P735 E34 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defense in depth : modern cybersecurity strategies and evolving threats ent://SD_ILS/0/SD_ILS:600191 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Zangana, Hewa Majeed, 1987- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394340750</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital immune system : principles and practices ent://SD_ILS/0/SD_ILS:600243 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Priyambada Dash, Sujata, editor.&#160;Mishra, Vaibhav.&#160;Shaw, Bijeta.&#160;Panda, Sandeep Kumar.&#160;Balamurugan, S.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D54 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394383788</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safeguarding satellite communications : issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:600245 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;An, Jianpin, author.<br/>Preferred Shelf Number&#160;TK5104 .A53 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Wiley handbook of art therapy ent://SD_ILS/0/SD_ILS:600264 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gussak, David, editor.&#160;Rosal, Marcia L., editor.<br/>Preferred Shelf Number&#160;RC489 .A7 W55 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394215027</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer memories 1 : core concepts ent://SD_ILS/0/SD_ILS:600350 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Darche, Philippe, author.<br/>Preferred Shelf Number&#160;TK7895 .M4 D37 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark essentials : simplifying network security and troubleshooting ent://SD_ILS/0/SD_ILS:580421 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Soni, Arun, author.<br/>Preferred Shelf Number&#160;TK5105.55<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003539261">https://www.taylorfrancis.com/books/9781003539261</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero-trust learning : applications in modern network security ent://SD_ILS/0/SD_ILS:580582 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kaushal, Chetna, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781779643575">https://www.taylorfrancis.com/books/9781779643575</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> INDUSTRIAL INTERNET OF THINGS FOR RESPONSIBLE TECHNOLOGY ent://SD_ILS/0/SD_ILS:586208 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587903">https://www.taylorfrancis.com/books/9781003587903</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The psychology of cybersecurity : hacking and the human mind ent://SD_ILS/0/SD_ILS:586224 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Singh, Tarnveer, author.&#160;Zheng, Sarah Y., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003610533">https://www.taylorfrancis.com/books/9781003610533</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HUMAN FACTORS AND CYBERSECURITY the psychology of online safety and security. ent://SD_ILS/0/SD_ILS:588164 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Hadlington, Lee.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003509011">https://www.taylorfrancis.com/books/9781003509011</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI and digital forensics ent://SD_ILS/0/SD_ILS:557101 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D345 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003469438">https://www.taylorfrancis.com/books/9781003469438</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY OF INDUSTRIAL INTERNET OF THINGS (IIOT) ent://SD_ILS/0/SD_ILS:560917 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;BUJA, ATDHE.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003383253">https://www.taylorfrancis.com/books/9781003383253</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity handbook : a guide for board members and C-suite executives ent://SD_ILS/0/SD_ILS:562071 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Young, Richard Gwashy author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003608059">https://www.taylorfrancis.com/books/9781003608059</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> BIOMETRIC TECHNOLOGY AND AUTHENTICATION biocryptography, and cloud-based architecture. ent://SD_ILS/0/SD_ILS:562997 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;TK7882 .B56<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562146">https://www.taylorfrancis.com/books/9781003562146</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NAVIGATING THE CYBER MAZE insights and humor on the digital frontier. ent://SD_ILS/0/SD_ILS:563001 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Muhlert, Matthias.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003562184">https://www.taylorfrancis.com/books/9781003562184</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Agile security in the digital era : challenges and cybersecurity trends ent://SD_ILS/0/SD_ILS:563898 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Zaydi, Mounia, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A414 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478676">https://www.taylorfrancis.com/books/9781003478676</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Issues in Communication Devices, Networks and Computing Models. Volume 1 ent://SD_ILS/0/SD_ILS:563926 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kumar, Budati Anil, editor.&#160;Ramakrishna, Akella, editor.&#160;Makkena, Goutham, editor.&#160;Ghinea, Gheorghita, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003513445">https://www.taylorfrancis.com/books/9781003513445</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero to hero : your guide to a career in cybersecurity ent://SD_ILS/0/SD_ILS:565841 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Asare, Felix Kyei, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003501589">https://www.taylorfrancis.com/books/9781003501589</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBEROLOGY an optimized approach to the cyber world. ent://SD_ILS/0/SD_ILS:577393 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Husain, Mohd Shahid, 1981-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409571">https://www.taylorfrancis.com/books/9781003409571</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety Assurance under Uncertainties : From Software to Cyber-Physical/Machine Learning Systems ent://SD_ILS/0/SD_ILS:578912 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Hasuo, Ichiro editor&#160;Ishikawa, Fuyuki editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093350">https://www.taylorfrancis.com/books/9781003093350</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> QUALITY ASSESSMENT AND SECURITY IN INDUSTRIAL INTERNET OF THINGS ent://SD_ILS/0/SD_ILS:579452 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Jha, Sudan.&#160;Shakya, Sarbagya Ratna.&#160;Ahmad, Sultan.&#160;Zhou, Zhaoxian.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003530572">https://www.taylorfrancis.com/books/9781003530572</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> MASTERING CYBERSECURITY a practical guide for professionals. Volume 1. ent://SD_ILS/0/SD_ILS:579460 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bhardwaj, Akashdeep.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003542520">https://www.taylorfrancis.com/books/9781003542520</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web hacking arsenal : a practical guide to modern web pentesting ent://SD_ILS/0/SD_ILS:580250 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Baloch, Rafay, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003373568">https://www.taylorfrancis.com/books/9781003373568</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-Enabled Threat Intelligence and Cyber Risk Assessment ent://SD_ILS/0/SD_ILS:582312 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Martiri, Edlira, editor&#160;Vajjhala, Narasimha, 1978- editor.&#160;Dalipi, Fisnik, editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless ad-hoc and sensor networks : architecture, protocols, and applications ent://SD_ILS/0/SD_ILS:582337 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Singh, Pawan, editor.&#160;Kumar, Sudesh (Computer scientist), editor.&#160;Gupta, Sachin Kumar, editor.&#160;Rai, Abhay Kumar, editor.&#160;Saif, Abdu, editor.<br/>Preferred Shelf Number&#160;TK5105.77<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003528982">https://www.taylorfrancis.com/books/9781003528982</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global governance of space cyber security : regulatory and institutional aspects ent://SD_ILS/0/SD_ILS:591021 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Li, Du, 1984- author.<br/>Preferred Shelf Number&#160;K564 .C6<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003561996">https://www.taylorfrancis.com/books/9781003561996</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> EFFECTS OF CYBER SUPPLY CHAIN ATTACKS &amp; MITIGATION STRATEGIES ent://SD_ILS/0/SD_ILS:591037 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585916">https://www.taylorfrancis.com/books/9781003585916</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ENTERPRISE FORTRESS the ultimate handbook for enterprise security architecture. ent://SD_ILS/0/SD_ILS:591038 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Stevens, Alex.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585923">https://www.taylorfrancis.com/books/9781003585923</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and EU law : adopting the network and information security directive ent://SD_ILS/0/SD_ILS:591167 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Karathanasis, Theodoros, author.<br/>Preferred Shelf Number&#160;KJE6071 .K39 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032722764">https://www.taylorfrancis.com/books/9781032722764</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Investigations of Smart Devices ent://SD_ILS/0/SD_ILS:551443 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bhardwaj, Akashdeep, 1971-, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570387">https://www.taylorfrancis.com/books/9781003570387</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The hack is back : techniques to beat hackers at their own games ent://SD_ILS/0/SD_ILS:558496 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Varsalone, Jesse, author.&#160;Haller, Christopher, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003033301">https://www.taylorfrancis.com/books/9781003033301</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRIVACY IN VEHICULAR NETWORKS challenges and solutions. ent://SD_ILS/0/SD_ILS:552331 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ma, Baihe.&#160;Wang, Xu.&#160;Ni, Wei.&#160;Liu, Ren Ping.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003518044">https://www.taylorfrancis.com/books/9781003518044</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCE ent://SD_ILS/0/SD_ILS:553331 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Trim, Peter R. J., author.&#160;Lee, Yang-Im, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570905">https://www.taylorfrancis.com/books/9781003570905</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity, cybercrimes, and smart emerging technologies : proceedings of the Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (CCSET 2023), Riyadh, Saudi Arabia, 5th-7th December, 2023 ent://SD_ILS/0/SD_ILS:553368 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (2nd : 2023 : Riyadh, Saudi Arabia), creator.&#160;Abd El-Latif, Ahmed A., 1984- editor.&#160;El-Affendi, Mohammed, 1971- editor.&#160;AlShara, Mohamed Ali, editor.&#160;Maleh, Yassine, 1987- editor.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003614197">https://www.taylorfrancis.com/books/9781003614197</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber insecurity : examining the past, defining the future ent://SD_ILS/0/SD_ILS:553423 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Leonas, Vladas, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032672601">https://www.taylorfrancis.com/books/9781032672601</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Vulnerability Discovery Process : Concepts and Applications ent://SD_ILS/0/SD_ILS:557374 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Anand, Adarsh, author.&#160;Bhatt, Navneet, author.&#160;Alhazmi, Omar H., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770046176">https://www.taylorfrancis.com/books/9788770046176</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> INTELLIGENT DATA DRIVEN TECHNIQUES FOR SECURITY OF DIGITAL ASSETS ent://SD_ILS/0/SD_ILS:559167 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Rana, Arun Kumar.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003590439">https://www.taylorfrancis.com/books/9781003590439</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital education : security, readiness, and technology enhancement ent://SD_ILS/0/SD_ILS:560183 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Susanto, Heru, 1977- editor&#160;Leu, Fang-Yie, editor&#160;Bakr&#299;, Sa&#699;d &#699;Al&#299; al-&#7716;&#257;jj, editor&#160;Haghi, A. K., editor<br/>Preferred Shelf Number&#160;LB1028.57<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032670782">https://www.taylorfrancis.com/books/9781032670782</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> THEORISING CYBER (IN)SECURITY information, materiality, and entropic security. ent://SD_ILS/0/SD_ILS:561001 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Fouad, Noran Shafik.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003454113">https://www.taylorfrancis.com/books/9781003454113</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Culture ent://SD_ILS/0/SD_ILS:565707 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bishop, Gulsebnem, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003368496">https://www.taylorfrancis.com/books/9781003368496</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in knowledge management : cyberthreats and solutions ent://SD_ILS/0/SD_ILS:567827 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Vajjhala, Narasimha, 1978- editor.&#160;Strang, Kenneth David, 1962- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498094">https://www.taylorfrancis.com/books/9781003498094</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and data science innovations for sustainable development of HEICC : healthcare, education, industry, cities and communities ent://SD_ILS/0/SD_ILS:568917 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Murugan, Thangavel, 1989- editor.&#160;W., Jaisingh, 1978- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711300">https://www.taylorfrancis.com/books/9781032711300</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN HEALTHCARE APPLICATIONS ent://SD_ILS/0/SD_ILS:568919 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Poonkuntran, S., editor.&#160;Dhanaraj, Rajesh Kumar, editor.&#160;Aanjankumar, S., editor.&#160;Sathyamoorthy, Malathy, editor.<br/>Preferred Shelf Number&#160;R859.7 .S43<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711379">https://www.taylorfrancis.com/books/9781032711379</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of AI-driven threat detection and prevention : a holistic approach ent://SD_ILS/0/SD_ILS:569783 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bhambri, Pankaj, editor.&#160;Anand A., Jose, 1975- editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003521020">https://www.taylorfrancis.com/books/9781003521020</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain technology for cyber defense, cybersecurity, and countermeasures : techniques, solutions, and applications ent://SD_ILS/0/SD_ILS:570600 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kshetri, Naresh, editor.&#160;Pandey, Purnendu Shekhar, editor.&#160;Ahmed, Mohiuddin (Computer scientist), editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 B5845 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003449515">https://www.taylorfrancis.com/books/9781003449515</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and machine learning in cybersecurity : a comprehensive guide to improving cybersecurity protocol ent://SD_ILS/0/SD_ILS:571776 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Young, Richard Gwashy, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003615026">https://www.taylorfrancis.com/books/9781003615026</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SAFEGUARDING THE FUTURE security and privacy by design for ai, metaverse, blockchain, and beyond. ent://SD_ILS/0/SD_ILS:573480 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Tang, Alan.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003390695">https://www.taylorfrancis.com/books/9781003390695</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent cybersecurity and resilience for critical industries : challenges and applications ent://SD_ILS/0/SD_ILS:575736 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Zaydi, Mounia, editor.&#160;Maleh, Yassine, 1987- editor.&#160;Ch&ecirc;nevert, Gabriel, editor&#160;Zaydi, Hayat, editor&#160;El Yaagoubi, Amina, editor<br/>Preferred Shelf Number&#160;QA76.9 .A25 I58 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770047746">https://www.taylorfrancis.com/books/9788770047746</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education ent://SD_ILS/0/SD_ILS:575737 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Fowler, Bradley, 1968- author.&#160;Chaundy, Bruce G., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788770047760">https://www.taylorfrancis.com/books/9788770047760</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT-enabled health care systems : applications, benefits, and challenges ent://SD_ILS/0/SD_ILS:576494 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kumar, Yatindra (Lecturer in electrical engineering), editor.&#160;Verma, Shashi Kant, editor.&#160;Singh, Archana (Lecturer in radiotherapy), editor.&#160;Kumar, Krishna (Engineer), editor&#160;Gupta, Manoj (Lecturer in computer science and engineering), editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003505235">https://www.taylorfrancis.com/books/9781003505235</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBER GOVERNANCE IN CHINA balancing state centrism and collaborative dynamics. ent://SD_ILS/0/SD_ILS:584280 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;CAI, CUIHONG.<br/>Preferred Shelf Number&#160;KNQ80 .C65<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003514473">https://www.taylorfrancis.com/books/9781003514473</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RECENT ADVANCES IN INTERNET OF THINGS SECURITY ent://SD_ILS/0/SD_ILS:584310 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Azrour, Mourade.&#160;Mabrouki, Jamal.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587552">https://www.taylorfrancis.com/books/9781003587552</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : AI and governance ent://SD_ILS/0/SD_ILS:584311 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : third party risk management ent://SD_ILS/0/SD_ILS:584312 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The art of cyber defense : from risk assessment to threat intelligence ent://SD_ILS/0/SD_ILS:586305 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Baddi, Youssef, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714806">https://www.taylorfrancis.com/books/9781032714806</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO playbook ent://SD_ILS/0/SD_ILS:587117 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Andreu, Andres, 1968- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003477556">https://www.taylorfrancis.com/books/9781003477556</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Defence : Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics ent://SD_ILS/0/SD_ILS:587286 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kumar, Ahlad, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032714813">https://www.taylorfrancis.com/books/9781032714813</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> GUARDIANS OF DATA a comprehensive guide to digital data protection. ent://SD_ILS/0/SD_ILS:554346 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Khidzir, Nik Zulkarnaen.&#160;Ahmed, Shekh Abdullah-Al-Musa.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604679">https://www.taylorfrancis.com/books/9781003604679</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DIGITAL RESILIENCE, CYBERSECURITY AND SUPPLY CHAINS ent://SD_ILS/0/SD_ILS:554348 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Singh, Tarnveer.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604969">https://www.taylorfrancis.com/books/9781003604969</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure health : a guide to cybersecurity for healthcare managers ent://SD_ILS/0/SD_ILS:555253 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Hammad, Mohamed, 1990- editor.&#160;Ali, Gauhar, editor.&#160;El-Affendi, Mohammed, 1971- editor.&#160;Maleh, Yassine, 1987- editor.&#160;Abd El-Latif, Ahmed A., 1984- editor.<br/>Preferred Shelf Number&#160;R858<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470038">https://www.taylorfrancis.com/books/9781003470038</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A reference manual for data privacy laws and cyber frameworks ent://SD_ILS/0/SD_ILS:556234 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;K3264 .C65<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003496915">https://www.taylorfrancis.com/books/9781003496915</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI : phishing and cybersecurity metrics ent://SD_ILS/0/SD_ILS:562960 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003503781">https://www.taylorfrancis.com/books/9781003503781</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The confluence of cryptography, blockchain and artificial intelligence ent://SD_ILS/0/SD_ILS:566001 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Ankita.&#160;Nayancy.&#160;Verma, Rajat.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711515">https://www.taylorfrancis.com/books/9781032711515</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Humans and cyber security : how organizations can enhance resilience through human factors ent://SD_ILS/0/SD_ILS:568695 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Widdowson, Amanda, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003427681">https://www.taylorfrancis.com/books/9781003427681</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human factors analysis of 23 cyberattacks ent://SD_ILS/0/SD_ILS:574564 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Moallem, Abbas, author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003461739">https://www.taylorfrancis.com/books/9781003461739</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimum spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:574605 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging threats and countermeasures in cybersecurity ent://SD_ILS/0/SD_ILS:599561 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Preferred Shelf Number&#160;QA76.9 .A25 E44 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230600</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Time-Sensitive Systems. ent://SD_ILS/0/SD_ILS:599899 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Choudhury, Tanupriy.&#160;Choudhury, Tanupriya/Singh, Rahul Kuma.&#160;Tomar, Ravi.<br/>Preferred Shelf Number&#160;TA168<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimizing biofuel production with artificial intelligence ent://SD_ILS/0/SD_ILS:599901 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kuila, Arindam, editor.&#160;Kumar, Depak, editor.<br/>Preferred Shelf Number&#160;TP339 .O68 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISA certified information systems auditor practice tests : covers 2024-2025 exam objectives ent://SD_ILS/0/SD_ILS:599955 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Grego, Peter H., author.&#160;Chapple, Mike, author.<br/>Preferred Shelf Number&#160;QA76.3 .G74 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394324460">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394324460</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P76 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605357 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8016-7">https://doi.org/10.1007/978-981-97-8016-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing, Big Data and Emerging Topics 12th Conference, JCC-BD&amp;ET 2024, La Plata, Argentina, June 25-27, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:605485 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Naiouf, Marcelo. editor. (orcid)0000-0001-9127-3212&#160;De Giusti, Laura. editor. (orcid)0000-0001-7366-1932&#160;Chichizola, Franco. editor. (orcid)0000-0001-8857-6343&#160;Libutti, Leandro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70807-7">https://doi.org/10.1007/978-3-031-70807-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering of Complex Computer Systems 28th International Conference, ICECCS 2024, Limassol, Cyprus, June 19-21, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605338 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Bai, Guangdong. editor. (orcid)0000-0002-6390-9890&#160;Ishikawa, Fuyuki. editor. (orcid)0000-0001-7725-2618&#160;Ait-Ameur, Yamine. editor. (orcid)0000-0003-4582-9712&#160;Papadopoulos, George A. editor. (orcid)0000-0001-9250-4916&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-66456-4">https://doi.org/10.1007/978-3-031-66456-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606319 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78011-0">https://doi.org/10.1007/978-3-031-78011-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606436 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0875-1">https://doi.org/10.1007/978-981-96-0875-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part V ent://SD_ILS/0/SD_ILS:606437 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0935-2">https://doi.org/10.1007/978-981-96-0935-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Applications in Industry and Engineering 37th International Conference, CAINE 2024, San Diego, CA, USA, October 21-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606618 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Hu, Gongzhu. editor.&#160;Kambhampaty, Krishna K. editor.&#160;Roy, Indranil. editor. (orcid)0000-0003-2611-456X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-76273-4">https://doi.org/10.1007/978-3-031-76273-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks ent://SD_ILS/0/SD_ILS:606871 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chen, Bo. author. (orcid)0000-0001-6150-3881&#160;Li, Tongxiang. author.&#160;Zhang, Wen-An. author.&#160;Yu, Li. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-9396-9">https://doi.org/10.1007/978-981-97-9396-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XX 20th IFIP WG 11.9 International Conference, New Delhi, India, January 4-5, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:606873 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kurkowski, Elizabeth. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71025-4">https://doi.org/10.1007/978-3-031-71025-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606946 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Li, Wenjuan. editor. (orcid)0000-0003-3745-5669&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Lopez, Javier. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80419-9">https://doi.org/10.1007/978-3-031-80419-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Systems Proceedings of 4th International Conference on Machine Learning, IoT and Big Data (ICMIB 2024), Volume 2 ent://SD_ILS/0/SD_ILS:606954 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Kumar Udgata, Siba. editor.&#160;Sethi, Srinivas. editor.&#160;Ghinea, George. editor. (orcid)0000-0003-2578-5580&#160;Kuanar, Sanjay Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8160-7">https://doi.org/10.1007/978-981-97-8160-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Color Imaging 8th International Workshop, CCIW 2024, Milan, Italy, September 25-27, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605571 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Schettini, Raimondo. editor. (orcid)0000-0001-7461-1451&#160;Tr&eacute;meau, Alain. editor. (orcid)0000-0003-2826-7519&#160;Tominaga, Shoji. editor. (orcid)0000-0001-6460-7694&#160;Bianco, Simone. editor. (orcid)0000-0002-7070-1545&#160;Buzzelli, Marco. editor. (orcid)0000-0003-1138-3345<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-72845-7">https://doi.org/10.1007/978-3-031-72845-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605581 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8540-7">https://doi.org/10.1007/978-981-97-8540-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605582 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8546-9">https://doi.org/10.1007/978-981-97-8546-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Informatics Proceedings of Eighth International Symposium on Intelligent Informatics (ISI 2023) ent://SD_ILS/0/SD_ILS:605596 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Pal, Sankar K. editor. (orcid)0000-0003-3301-4751&#160;Thampi, Sabu M. editor.&#160;Abraham, Ajith. editor. (orcid)0000-0002-0169-6738&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2147-4">https://doi.org/10.1007/978-981-97-2147-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Third International Conference on Computing and Communication Networks ICCCN 2023, Volume 2 ent://SD_ILS/0/SD_ILS:605637 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Fortino, Giancarlo. editor.&#160;Kumar, Akshi. editor. (orcid)0000-0003-4263-7168&#160;Swaroop, Abhishek. editor.&#160;Shukla, Pancham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2671-4">https://doi.org/10.1007/978-981-97-2671-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and Communication Engineering 4th International Conference, CCCE 2024, Oslo, Norway, May 24-26, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:605666 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Neri, Filippo. editor. (orcid)0000-0002-2529-2287&#160;Du, Ke-Lin. editor. (orcid)0000-0002-9136-3952&#160;San-Blas, Angel-Antonio. editor. (orcid)0000-0002-4341-8277&#160;Jiang, Zhiyu. editor. (orcid)0000-0002-6360-8262&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71079-7">https://doi.org/10.1007/978-3-031-71079-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605670 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75757-0">https://doi.org/10.1007/978-3-031-75757-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605671 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75764-8">https://doi.org/10.1007/978-3-031-75764-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technical and Regulatory Perspectives on Information Retrieval and Recommender Systems Fairness, Transparency, and Privacy ent://SD_ILS/0/SD_ILS:605682 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Schedl, Markus. author.&#160;Anelli, Vito Walter. author.&#160;Lex, Elisabeth. author. (orcid)0000-0001-5293-2967&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-69978-8">https://doi.org/10.1007/978-3-031-69978-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems ent://SD_ILS/0/SD_ILS:605727 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Cheng, Wei. author. (orcid)0000-0001-9433-7576&#160;Guilley, Sylvain. author. (orcid)0000-0002-5044-3534&#160;Rioul, Olivier. author. (orcid)0000-0002-8681-8916&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64399-6">https://doi.org/10.1007/978-3-031-64399-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Biometrics ent://SD_ILS/0/SD_ILS:605790 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Jain, Anil K. author.&#160;Ross, Arun A. author. (orcid)0000-0001-8850-3013&#160;Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725&#160;Swearingen, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606283 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78020-2">https://doi.org/10.1007/978-3-031-78020-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security IC4S'05 Volume 2 ent://SD_ILS/0/SD_ILS:606395 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014&#160;Tanwar, Sudeep. editor.&#160;Epiphaniou, Gregory. editor. (orcid)0000-0002-4715-212X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-7371-8">https://doi.org/10.1007/978-981-97-7371-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part IX ent://SD_ILS/0/SD_ILS:606427 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0947-5">https://doi.org/10.1007/978-981-96-0947-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:606438 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0941-3">https://doi.org/10.1007/978-981-96-0941-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part IV ent://SD_ILS/0/SD_ILS:606498 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0894-2">https://doi.org/10.1007/978-981-96-0894-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606449 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0888-1">https://doi.org/10.1007/978-981-96-0888-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Intelligence and Information Retrieval Proceedings of CIIR 2023, Volume 1 ent://SD_ILS/0/SD_ILS:607004 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Dutta, Soumi. editor. (orcid)0000-0002-1052-7055&#160;Bhattacharya, Abhishek. editor.&#160;Shahnaz, Celia. editor.&#160;Chakrabarti, Satyajit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-7603-0">https://doi.org/10.1007/978-981-97-7603-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Discovery Science 27th International Conference, DS 2024, Pisa, Italy, October 14-16, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:607053 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Pedreschi, Dino. editor. (orcid)0000-0003-4801-3225&#160;Monreale, Anna. editor. (orcid)0000-0001-8541-0284&#160;Guidotti, Riccardo. editor. (orcid)0000-0002-2827-7613&#160;Pellungrini, Roberto. editor. (orcid)0000-0003-3268-9271&#160;Naretto, Francesca. editor. (orcid)0000-0003-1301-7787<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78977-9">https://doi.org/10.1007/978-3-031-78977-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Discovery Science 27th International Conference, DS 2024, Pisa, Italy, October 14-16, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:607054 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Pedreschi, Dino. editor. (orcid)0000-0003-4801-3225&#160;Monreale, Anna. editor. (orcid)0000-0001-8541-0284&#160;Guidotti, Riccardo. editor. (orcid)0000-0002-2827-7613&#160;Pellungrini, Roberto. editor. (orcid)0000-0003-3268-9271&#160;Naretto, Francesca. editor. (orcid)0000-0003-1301-7787<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78980-9">https://doi.org/10.1007/978-3-031-78980-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings ent://SD_ILS/0/SD_ILS:607075 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Horn Iwaya, Leonardo. editor. (orcid)0000-0001-9005-0543&#160;Kamm, Liina. editor. (orcid)0000-0003-1479-2195&#160;Martucci, Leonardo. editor. (orcid)0000-0002-9980-3473&#160;Pulls, Tobias. editor. (orcid)0000-0001-6459-8409&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-79007-2">https://doi.org/10.1007/978-3-031-79007-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Network Engineering Proceedings ICDSNE 2024 ent://SD_ILS/0/SD_ILS:607079 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Namasudra, Suyel. editor.&#160;Kar, Nirmalya. editor. (orcid)0000-0002-7371-232X&#160;Patra, Sarat Kumar. editor.&#160;Taniar, David. editor. (orcid)0000-0002-8862-3960&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8336-6">https://doi.org/10.1007/978-981-97-8336-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Machine Learning 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26-27, 2024, Revised Selected Papers, Part-I ent://SD_ILS/0/SD_ILS:607094 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Soliman, Khalid S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-77493-5">https://doi.org/10.1007/978-3-031-77493-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Machine Learning 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26-27, 2024, Revised Selected Papers, Part-II ent://SD_ILS/0/SD_ILS:607099 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Soliman, Khalid S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-79086-7">https://doi.org/10.1007/978-3-031-79086-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable and Practical Security 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:607104 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Liu, Joseph K. editor.&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Sun, Shi-Feng. editor.&#160;Liu, Xiaoning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0957-4">https://doi.org/10.1007/978-981-96-0957-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable and Practical Security 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:607122 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Liu, Joseph K. editor.&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Sun, Shi-Feng. editor.&#160;Liu, Xiaoning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0954-3">https://doi.org/10.1007/978-981-96-0954-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:607144 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Lee, Jong-Hyouk. editor. (orcid)0000-0002-1753-1284&#160;Emura, Keita. editor. (orcid)0000-0002-8969-3581&#160;Lee, Sokjoon. editor. (orcid)0000-0002-4632-8322&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-1624-4">https://doi.org/10.1007/978-981-96-1624-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-Physical Systems Security A Multi-disciplinary Approach ent://SD_ILS/0/SD_ILS:607161 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Choudhury, Amitava. editor. (orcid)0000-0001-5153-4449&#160;Kaushik, Keshav. editor. (orcid)0000-0003-3777-765X&#160;Kumar, Vinay. editor.&#160;Singh, Binod Kumar. editor. (orcid)0000-0002-2697-8918&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-5734-3">https://doi.org/10.1007/978-981-97-5734-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric Recognition 18th Chinese Conference, CCBR 2024, Nanjing, China, November 22-24, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:607171 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Yu, Shiqi. editor. (orcid)0000-0002-5213-5877&#160;Jia, Wei. editor. (orcid)0000-0001-5628-6237&#160;Shu, Xiangbo. editor.&#160;Yuan, Xiaotong. editor.&#160;Gui, Jie. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-1068-6">https://doi.org/10.1007/978-981-96-1068-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric Recognition 18th Chinese Conference, CCBR 2024, Nanjing, China, November 22-24, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:607172 2026-03-18T16:49:17Z 2026-03-18T16:49:17Z Author&#160;Yu, Shiqi. editor. (orcid)0000-0002-5213-5877&#160;Jia, Wei. editor. (orcid)0000-0001-5628-6237&#160;Shu, Xiangbo. editor.&#160;Yuan, Xiaotong. editor.&#160;Gui, Jie. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-1071-6">https://doi.org/10.1007/978-981-96-1071-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>