Search Results for Computer Security. - Narrowed by: 2012
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2025-12-10T06:07:08Z
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:313473
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Stallings, William. Brown, Lawrie<br/>Preferred Shelf Number QA76.9 S73 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197475
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197479
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Thampi, Sabu M. editor. Zomaya, Albert Y. editor. Strufe, Thorsten. editor. Alcaraz Calero, Jose M. editor. Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197586
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Kim, Tai-hoon. editor. Stoica, Adrian. editor. Fang, Wai-chi. editor. Vasilakos, Thanos. editor. Villalba, Javier García. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35264-5">http://dx.doi.org/10.1007/978-3-642-35264-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197419
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197420
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197425
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197329
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Foresti, Sara. editor. Yung, Moti. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer architecture and security : fundamentals of designing secure computer systems
ent://SD_ILS/0/SD_ILS:248865
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:539793
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:542831
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Privacy, Confidentiality, and Health Research
ent://SD_ILS/0/SD_ILS:237994
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Lowrance, William W..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9781139107969">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
ent://SD_ILS/0/SD_ILS:145689
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in intelligence and security informatics
ent://SD_ILS/0/SD_ILS:146055
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Mao, Wenji. Wang, Fei-Yue.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent threat understanding the danger and how to protect your organization
ent://SD_ILS/0/SD_ILS:146056
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
ent://SD_ILS/0/SD_ILS:146274
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded systems security practical methods for safe and secure software and systems development
ent://SD_ILS/0/SD_ILS:146451
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Kleidermacher, David. Kleidermacher, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Low tech hacking street smarts for security professionals
ent://SD_ILS/0/SD_ILS:147742
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware forensics field guide for Windows dystems digital forensics field guides
ent://SD_ILS/0/SD_ILS:147898
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The hacker's guide to OS X exploiting OS X from the root up
ent://SD_ILS/0/SD_ILS:148006
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking web apps detecting and preventing web application security problems
ent://SD_ILS/0/SD_ILS:148161
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance
ent://SD_ILS/0/SD_ILS:148429
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Chuvakin, Anton. Williams, Branden R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148516
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Client-side attacks and defense
ent://SD_ILS/0/SD_ILS:148731
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Oriyano, Sean-Philip. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
ent://SD_ILS/0/SD_ILS:145254
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook on securing cyber-physical critical infrastructure
ent://SD_ILS/0/SD_ILS:145579
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CISSP study guide
ent://SD_ILS/0/SD_ILS:148769
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reliability and availability of cloud computing
ent://SD_ILS/0/SD_ILS:249383
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Bauer, Eric. Adams, Randee. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:276700
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security metrics a beginner's guide
ent://SD_ILS/0/SD_ILS:293238
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the clicks network security in the age of social media
ent://SD_ILS/0/SD_ILS:293240
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle WebLogic server 11g administration handbook
ent://SD_ILS/0/SD_ILS:293243
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Alapati, Sam R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security policy guidebook
ent://SD_ILS/0/SD_ILS:299195
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Bayuk, Jennifer L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118241530">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://lib.myilibrary.com?id=450182">Connect to MyiLibrary resource.</a>
ebrary <a href="http://site.ebrary.com/id/10630610">http://site.ebrary.com/id/10630610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics
ent://SD_ILS/0/SD_ILS:247542
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Deibert, Ronald. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Robust control system networks how to achieve reliable control after Stuxnet
ent://SD_ILS/0/SD_ILS:280181
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Langner, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The healthy Mac preventive care, practical diagnostics, and proven remedies
ent://SD_ILS/0/SD_ILS:293416
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Morris, Heather. Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-mac-preventive-care-practical-diagnostics-proven-remedies">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows 7 SP1
ent://SD_ILS/0/SD_ILS:293421
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/windows-7-sp1-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows 7 for seniors
ent://SD_ILS/0/SD_ILS:293424
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/windows-7-for-seniors-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computing for seniors
ent://SD_ILS/0/SD_ILS:293452
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Matthews, Martin S. Matthews, Carole Boggs. Bouton, Gary David, 1953- Sandberg, Bobbi.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/computing-for-seniors-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The healthy PC preventive care, home remedies, and green computing
ent://SD_ILS/0/SD_ILS:293464
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows 7
ent://SD_ILS/0/SD_ILS:293477
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/windows-7-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:241837
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Operating systems demystified
ent://SD_ILS/0/SD_ILS:294101
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RC4 stream cipher and its variants
ent://SD_ILS/0/SD_ILS:538754
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Paul, Goutam., author. Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number QA76.9 .A25 P385 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439831373">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:538782
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secure and resilient software : requirements, test cases, and testing methods
ent://SD_ILS/0/SD_ILS:540156
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Merkow, Mark S., author. Raghavan, Lakshmikanth.<br/>Preferred Shelf Number QA76.76 .T48 M47 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Visual cryptography and secret image sharing
ent://SD_ILS/0/SD_ILS:539468
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number TA1637 .V544 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Handbook on soft computing for video surveillance
ent://SD_ILS/0/SD_ILS:539764
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Pal, Sankar K. Petrosino, Alfredo. Maddalena, Lucia.<br/>Preferred Shelf Number QA76.9 .S63 H36 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439856857">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Network and application security fundamentals and practices
ent://SD_ILS/0/SD_ILS:541627
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Ganguly, Debashis., author. Lahiri, Shibamouli.<br/>Preferred Shelf Number TK5105.59 .G36 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
ent://SD_ILS/0/SD_ILS:543119
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Macaulay, Tyson., author. Singer, Bryan.<br/>Preferred Shelf Number TS156.8 .M328 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439801987">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cybersecurity : public sector threats and responses
ent://SD_ILS/0/SD_ILS:545406
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Andreasson, Kim J.<br/>Preferred Shelf Number TK5105.59 .C927 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439846643">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The 7 qualities of highly secure software
ent://SD_ILS/0/SD_ILS:544951
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Paul, Mano., author.<br/>Preferred Shelf Number QA76.9 .A25 P38 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439814475">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits
ent://SD_ILS/0/SD_ILS:545161
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T56 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439880289">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Data mining tools for malware detection
ent://SD_ILS/0/SD_ILS:545796
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Masud, Mehedy., author. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Preferred Shelf Number QA76.9 .D343 M385 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Asset protection through security awareness
ent://SD_ILS/0/SD_ILS:546687
2025-12-10T06:07:08Z
2025-12-10T06:07:08Z
Author Speed, Tyler Justin., author.<br/>Preferred Shelf Number TK5105.59 .S643 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439809839">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>