Search Results for Computer Security. - Narrowed by: 2014 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ps$003d300$0026isd$003dtrue? 2024-11-04T15:03:48Z Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer Safety, Reliability, and Security 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:482801 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Bondavalli, Andrea. editor.&#160;Di Giandomenico, Felicita. editor. (orcid)0000-0002-8760-7299&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10506-2">https://doi.org/10.1007/978-3-319-10506-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485676 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Bondavalli, Andrea. editor.&#160;Ceccarelli, Andrea. editor.&#160;Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10557-4">https://doi.org/10.1007/978-3-319-10557-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What Is Computer Science? An Information Security Perspective ent://SD_ILS/0/SD_ILS:488536 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Page, Daniel. author.&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unauthorized access the crisis in online privacy and security ent://SD_ILS/0/SD_ILS:285321 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Sloan, Robert H.&#160;Warner, Richard, 1946-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439830147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:285408 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Memon, Qurban Ali, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:285413 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:342584 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;ONLINE(342584.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:342886 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;DeFranco, Joanna F., author.<br/>Preferred Shelf Number&#160;ONLINE(342886.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network and system security ent://SD_ILS/0/SD_ILS:306690 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing information security ent://SD_ILS/0/SD_ILS:306692 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:306695 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Snedaker, Susan.&#160;Rima, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:341816 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Abbadi, Imad M., author.<br/>Preferred Shelf Number&#160;ONLINE(341816.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a> <a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:341997 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Touhill, Gregory J., author.&#160;Touhill, C. J., 1938- author.<br/>Preferred Shelf Number&#160;ONLINE(341997.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a> ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a> MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data analysis for network cyber-security ent://SD_ILS/0/SD_ILS:354757 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Adams, Niall M., 1968-&#160;Heard, Nicholas.<br/>Preferred Shelf Number&#160;TK5105.59 D375 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:355575 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Gonzalez, Deborah, author.<br/>Preferred Shelf Number&#160;ONLINE(355575.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:356396 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;ONLINE(356396.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:356516 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number&#160;ONLINE(356516.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:356556 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number&#160;ONLINE(356556.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:484756 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Pino, Robinson E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Smart Embedded Devices, Platforms and Applications ent://SD_ILS/0/SD_ILS:484765 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Markantonakis, Konstantinos. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Denial of Service Attack and Defense ent://SD_ILS/0/SD_ILS:484833 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Yu, Shui. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013 ent://SD_ILS/0/SD_ILS:485061 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Hameurlain, Abdelkader. editor.&#160;K&uuml;ng, Josef. editor.&#160;Wagner, Roland. editor.&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Thoai, Nam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485531 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Chau, Michael. editor.&#160;Chen, Hsinchun. editor.&#160;Wang, G. Alan. editor.&#160;Wang, Jau-Hwang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:485543 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06811-4">https://doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:485697 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Kott, Alexander. editor.&#160;Wang, Cliff. editor.&#160;Erbacher, Robert F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485702 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Stavrou, Angelos. editor.&#160;Bos, Herbert. editor.&#160;Portokalidis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11379-1">https://doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485714 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Bernsmed, Karin. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485732 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Felber, Pascal. editor.&#160;Garg, Vijay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485743 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Gritzalis, Dimitris. editor.&#160;Kiayias, Aggelos. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485784 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Mellouk, Abdelhamid. editor.&#160;Fowler, Scott. editor.&#160;Daachi, Boubaker. editor.&#160;Hoceini, Said. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13174-0">https://doi.org/10.1007/978-3-319-13174-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trustworthy Service Composition The Aniketos Approach ent://SD_ILS/0/SD_ILS:485813 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Brucker, Achim. editor.&#160;Dalpiaz, Fabiano. editor. (orcid)0000-0003-4480-3887&#160;Giorgini, Paolo. editor.&#160;Meland, Per H&aring;kon. editor.&#160;Rios, Erkuden. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13518-2">https://doi.org/10.1007/978-3-319-13518-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485842 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Chen, Liqun. editor.&#160;Mitchell, Chris. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486671 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Saxena, Nitesh. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486701 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Sideridis, Alexander B. editor.&#160;Kardasiadou, Zoe. editor.&#160;Yialouris, Constantine P. editor.&#160;Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:486885 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Wang, Lingyu. author.&#160;Albanese, Massimiliano. author.&#160;Jajodia, Sushil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486886 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Lluch Lafuente, Alberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05119-2">https://doi.org/10.1007/978-3-319-05119-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486887 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:486874 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Faloutsos, Michalis. editor.&#160;Kuzmanovic, Aleksandar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04918-2">https://doi.org/10.1007/978-3-319-04918-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Computing and Services International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487154 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43908-1">https://doi.org/10.1007/978-3-662-43908-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Digital Forensics: Forensic Investigation and Applications ent://SD_ILS/0/SD_ILS:487168 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Muda, Azah Kamilah. editor.&#160;Choo, Yun-Huoy. editor.&#160;Abraham, Ajith. editor.&#160;N. Srihari, Sargur. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05885-6">https://doi.org/10.1007/978-3-319-05885-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ent://SD_ILS/0/SD_ILS:487178 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Hassanien, Aboul Ella. editor.&#160;Kim, Tai-Hoon. editor.&#160;Kacprzyk, Janusz. editor.&#160;Awad, Ali Ismail. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43616-5">https://doi.org/10.1007/978-3-662-43616-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487617 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Jahangir, Amir Hossein. editor.&#160;Movaghar, Ali. editor.&#160;Asadi, Hossein. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10903-9">https://doi.org/10.1007/978-3-319-10903-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487632 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Natarajan, Raja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04483-5">https://doi.org/10.1007/978-3-319-04483-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:487946 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Nepal, Surya. editor.&#160;Pathan, Mukaddim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:487956 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Jajodia, Sushil. editor.&#160;Kant, Krishna. editor.&#160;Samarati, Pierangela. editor.&#160;Singhal, Anoop. editor.&#160;Swarup, Vipin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9278-8">https://doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Systems for Human Cognition Augmentation ent://SD_ILS/0/SD_ILS:488504 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Pino, Robinson E. editor.&#160;Kott, Alexander. editor.&#160;Shevenell, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10374-7">https://doi.org/10.1007/978-3-319-10374-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:488519 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Al-Shaer, Ehab. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10371-6">https://doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488522 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Gladyshev, Pavel. editor.&#160;Marrington, Andrew. editor.&#160;Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488530 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Zhou, Jianying. editor.&#160;Gal-Oz, Nurit. editor.&#160;Zhang, Jie. editor.&#160;Gudes, Ehud. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43813-8">https://doi.org/10.1007/978-3-662-43813-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Information Systems Engineering Workshops CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488707 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Iliadis, Lazaros. editor.&#160;Papazoglou, Michael. editor.&#160;Pohl, Klaus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07869-4">https://doi.org/10.1007/978-3-319-07869-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberpatterns Unifying Design Patterns with Security and Attack Patterns ent://SD_ILS/0/SD_ILS:488814 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Blackwell, Clive. editor.&#160;Zhu, Hong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04447-7">https://doi.org/10.1007/978-3-319-04447-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 ent://SD_ILS/0/SD_ILS:488884 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Krishnan, G. Sai Sundara. editor.&#160;Anitha, R. editor.&#160;Lekshmi, R. S. editor.&#160;Kumar, M. Senthil. editor.&#160;Bonato, Anthony. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488920 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488930 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Tryfonas, Theo. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488934 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Linawati. editor.&#160;Mahendra, Made Sudiana. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55032-4">https://doi.org/10.1007/978-3-642-55032-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:488944 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Heisel, Maritta. editor.&#160;Joosen, Wouter. editor.&#160;L&oacute;pez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488945 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Preneel, Bart. editor.&#160;Ikonomou, Demosthenes. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06749-0">https://doi.org/10.1007/978-3-319-06749-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488947 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Eckert, Claudia. editor.&#160;Katsikas, Sokratis K. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488954 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;De Cristofaro, Emiliano. editor.&#160;Murdoch, Steven J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08506-7">https://doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488957 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488960 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Sperotto, Anna. editor.&#160;Doyen, Guillaume. editor.&#160;Latr&eacute;, Steven. editor.&#160;Charalambides, Marinos. editor.&#160;Stiller, Burkhard. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488978 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Francillon, Aur&eacute;lien. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08302-5">https://doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Business Software Current Trends in Business Software Development ent://SD_ILS/0/SD_ILS:489323 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Brunetti, Gino. editor.&#160;Feld, Thomas. editor.&#160;Heuser, Lutz. editor.&#160;Schnitter, Joachim. editor.&#160;Webel, Christian. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482710 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Obaidat, Mohammad S. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44791-8">https://doi.org/10.1007/978-3-662-44791-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486191 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Bissyand&eacute;, Tegawend&eacute; F. editor.&#160;van Stam, Gertjan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08368-1">https://doi.org/10.1007/978-3-319-08368-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:487022 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;De Ryck, Philippe. author.&#160;Desmet, Lieven. author.&#160;Piessens, Frank. author.&#160;Johns, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487210 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Preneel, Bart. editor.&#160;Ikonomou, Demosthenes. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54069-1">https://doi.org/10.1007/978-3-642-54069-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference ent://SD_ILS/0/SD_ILS:487216 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:487072 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Stalla-Bourdillon, Sophie. author.&#160;Phillips, Joshua. author.&#160;Ryan, Mark D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487278 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:487333 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Vasudevan, Amit. author.&#160;McCune, Jonathan M. author.&#160;Newsome, James. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487382 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Kimppa, Kai. editor.&#160;Whitehouse, Diane. editor.&#160;Kuusela, Tiina. editor.&#160;Phahlamohlaka, Jackie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Sketch-Based Passwords A General Framework ent://SD_ILS/0/SD_ILS:487393 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Riggan, Benjamin S. author.&#160;Snyder, Wesley E. author.&#160;Wang, Cliff. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:487747 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10530-7">https://doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487762 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Danger, Jean Luc. editor.&#160;Debbabi, Mourad. editor.&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487826 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:487858 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488011 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Batten, Lynn. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Niu, Wenjia. editor.&#160;Warren, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488089 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Cleary, Frances. editor.&#160;Felici, Massimo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12574-9">https://doi.org/10.1007/978-3-319-12574-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Large-Scale Data Analytics ent://SD_ILS/0/SD_ILS:488092 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Gkoulalas-Divanis, Aris. editor.&#160;Labbi, Abderrahim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9242-9">https://doi.org/10.1007/978-1-4614-9242-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488140 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Lloret Mauri, Jaime. editor.&#160;Thampi, Sabu M. editor.&#160;Rawat, Danda B. editor.&#160;Jin, Di. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44966-0">https://doi.org/10.1007/978-3-662-44966-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:488222 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Xiao, Sheng. author.&#160;Gong, Weibo. author.&#160;Towsley, Don. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:488233 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Donovan, Peter. author.&#160;Mack, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberterrorism Understanding, Assessment, and Response ent://SD_ILS/0/SD_ILS:488243 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Chen, Thomas M. editor.&#160;Jarvis, Lee. editor.&#160;Macdonald, Stuart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488324 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44952-3">https://doi.org/10.1007/978-3-662-44952-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:488367 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pervasive Wireless Environments: Detecting and Localizing User Spoofing ent://SD_ILS/0/SD_ILS:488438 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Yang, Jie. author.&#160;Chen, Yingying. author.&#160;Trappe, Wade. author.&#160;Cheng, Jerry. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07356-9">https://doi.org/10.1007/978-3-319-07356-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Cloud Computing ent://SD_ILS/0/SD_ILS:488472 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Krcmar, Helmut. editor.&#160;Reussner, Ralf. editor.&#160;Rumpe, Bernhard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12718-7">https://doi.org/10.1007/978-3-319-12718-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework ent://SD_ILS/0/SD_ILS:488478 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Ben Ayed, Ghazi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08231-8">https://doi.org/10.1007/978-3-319-08231-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:488634 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Proudler, Graeme. author.&#160;Chen, Liqun. author.&#160;Dalton, Chris. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488647 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Obaidat, Mohammad S. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44788-8">https://doi.org/10.1007/978-3-662-44788-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Identity ent://SD_ILS/0/SD_ILS:484375 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;de Andrade, Norberto Nuno Gomes. author.&#160;Chen-Wilson, Lisha. author.&#160;Argles, David. author.&#160;Wills, Gary. author.&#160;Schiano di Zenise, Michele. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485594 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Holz, Thorsten. editor. (orcid)0000-0002-2783-1264&#160;Ioannidis, Sotiris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485793 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Chow, Sherman S.M. editor.&#160;Camenisch, Jan. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489000 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Villari, Massimo. editor.&#160;Zimmermann, Wolf. editor.&#160;Lau, Kung-Kiu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489005 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Benaloh, Josh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interactive Theorem Proving 5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489018 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Klein, Gerwin. editor.&#160;Gamboa, Ruben. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08970-6">https://doi.org/10.1007/978-3-319-08970-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489066 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489091 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Au, Man Ho. editor.&#160;Carminati, Barbara. editor.&#160;Kuo, C.-C. Jay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489103 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Wagner, Roland. editor.&#160;Neuhold, Erich J. editor.&#160;Takizawa, Makoto. editor.&#160;K&uuml;ng, Josef. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489121 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Katsikas, Sokratis. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-53997-8">https://doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489223 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489261 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Lange, Tanja. editor.&#160;Lauter, Kristin. editor.&#160;Lison&#283;k, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489496 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobility Data Management and Exploration ent://SD_ILS/0/SD_ILS:489503 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Pelekis, Nikos. author.&#160;Theodoridis, Yannis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-0392-4">https://doi.org/10.1007/978-1-4939-0392-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489506 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Atluri, Vijay. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489471 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Kremer, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489545 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and cyberwarfare ent://SD_ILS/0/SD_ILS:341980 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Bernik, Igor, author.<br/>Preferred Shelf Number&#160;ONLINE(341980.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security ent://SD_ILS/0/SD_ILS:342168 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Perez, Andre.<br/>Preferred Shelf Number&#160;ONLINE(342168.1)<br/>Electronic Access&#160;ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a> MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a> Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems ent://SD_ILS/0/SD_ILS:355352 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Knapp, Eric D.&#160;Langill, Joel Thomas.<br/>Preferred Shelf Number&#160;ONLINE(355352.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:355450 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE(355450.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an information security awareness program defending against social engineering and technical threats ent://SD_ILS/0/SD_ILS:355618 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Gardner, Bill (Bill G.)&#160;Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number&#160;ONLINE(355618.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:355770 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Andress, Jason, author.<br/>Preferred Shelf Number&#160;ONLINE(355770.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:355829 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;ONLINE(355829.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:355853 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Sood, Aditya K., author.&#160;Enbody, Richard J., author.<br/>Preferred Shelf Number&#160;ONLINE(355853.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE(355909.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security careers skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:356043 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Walker, Stephen W.&#160;Foushee, James E.<br/>Preferred Shelf Number&#160;ONLINE(356043.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of digital privacy simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:356123 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Cherry, Denny.&#160;LaRock, Thomas.<br/>Preferred Shelf Number&#160;ONLINE(356123.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The frugal CISO : using innovation and smart approaches to maximize your security posture ent://SD_ILS/0/SD_ILS:356624 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Anderson, Kerry Ann, author.<br/>Preferred Shelf Number&#160;ONLINE(356624.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:356657 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;ONLINE(356657.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:356681 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;ONLINE(356681.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for multihop wireless networks ent://SD_ILS/0/SD_ILS:356916 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Khan, Shafiullah, editor.&#160;Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number&#160;ONLINE(356916.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security management a critical thinking approach ent://SD_ILS/0/SD_ILS:342845 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Preferred Shelf Number&#160;ONLINE(342845.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:342868 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Hagar, Jon Duncan, author.<br/>Preferred Shelf Number&#160;ONLINE(342868.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488985 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Nguyen, Phong Q. editor.&#160;Oswald, Elisabeth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55220-5">https://doi.org/10.1007/978-3-642-55220-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Continued Rise of the Cloud Advances and Trends in Cloud Computing ent://SD_ILS/0/SD_ILS:488899 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6452-4">https://doi.org/10.1007/978-1-4471-6452-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Touchless Palmprint Recognition Systems ent://SD_ILS/0/SD_ILS:488861 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Genovese, Angelo. author.&#160;Piuri, Vincenzo. author.&#160;Scotti, Fabio. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10365-5">https://doi.org/10.1007/978-3-319-10365-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489025 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Domingo-Ferrer, Josep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11257-2">https://doi.org/10.1007/978-3-319-11257-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489033 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Saad, Walid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489038 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Cuellar, Jorge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems -- CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489052 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;Robshaw, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44709-3">https://doi.org/10.1007/978-3-662-44709-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489054 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Maffei, Matteo. editor.&#160;Tuosto, Emilio. editor. (orcid)0000-0002-7032-3281&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45917-1">https://doi.org/10.1007/978-3-662-45917-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489055 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Teufel, Stephanie. editor.&#160;A Min, Tjoa. editor.&#160;You, Illsun. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489060 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Hansen, Marit. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Leenes, Ronald. editor.&#160;Whitehouse, Diane. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489080 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Dietrich, Sven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08509-8">https://doi.org/10.1007/978-3-319-08509-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489068 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Meier, Willi. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489070 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Lioudakis, Georgios. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Foley, Simon. editor.&#160;Fitzgerald, William M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2014 Conferences Confederated International Conferences: CoopIS and ODBASE 2014, Amantea, Italy, October 27-31, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489077 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Meersman, Robert. editor.&#160;Panetto, Herve. editor. (orcid)0000-0002-5537-2261&#160;Dillon, Tharam. editor.&#160;Missikoff, Michele. editor.&#160;Liu, Lin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45563-0">https://doi.org/10.1007/978-3-662-45563-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Switzerland ent://SD_ILS/0/SD_ILS:489573 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Dunn Cavelty, Myriam. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:489575 2024-11-04T15:03:48Z 2024-11-04T15:03:48Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44381-1">https://doi.org/10.1007/978-3-662-44381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>