Search Results for Computer Security. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-03-21T04:25:34Z Elements of Computer Security ent://SD_ILS/0/SD_ILS:168393 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:602382 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47549-8">https://doi.org/10.1007/978-3-031-47549-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Management and Wireless Networks 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608220 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Daimi, Kevin. editor.&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094&#160;Deligiannidis, Leonidas. editor. (orcid)0009-0002-3674-0142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86637-1">https://doi.org/10.1007/978-3-031-86637-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602337 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51476-0">https://doi.org/10.1007/978-3-031-51476-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:602338 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51482-1">https://doi.org/10.1007/978-3-031-51482-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602345 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50594-2">https://doi.org/10.1007/978-3-031-50594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:602346 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51479-1">https://doi.org/10.1007/978-3-031-51479-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602750 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor. (orcid)0000-0001-8792-0413&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54204-6">https://doi.org/10.1007/978-3-031-54204-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602834 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Abie, Habtamu. editor. (orcid)0000-0003-0866-5050&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Verderame, Luca. editor. (orcid)0000-0001-7155-7429&#160;Cambiaso, Enrico. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54129-2">https://doi.org/10.1007/978-3-031-54129-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605040 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70879-4">https://doi.org/10.1007/978-3-031-70879-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605041 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70890-9">https://doi.org/10.1007/978-3-031-70890-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:605042 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70903-6">https://doi.org/10.1007/978-3-031-70903-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:605052 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70896-1">https://doi.org/10.1007/978-3-031-70896-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605083 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ceccarelli, Andrea. editor. (orcid)0000-0002-2291-2428&#160;Trapp, Mario. editor.&#160;Bondavalli, Andrea. editor. (orcid)0000-0001-7366-6530&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68738-9">https://doi.org/10.1007/978-3-031-68738-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605157 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Minematsu, Kazuhiko. editor. (orcid)0000-0002-3427-6772&#160;Mimura, Mamoru. editor. (orcid)0000-0003-4323-9911&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-7737-2">https://doi.org/10.1007/978-981-97-7737-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402736 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201&#160;Campegiani, Paolo. editor.&#160;Czach&oacute;rski, Tadeusz. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Komnios, Ioannis. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:401907 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Petrenko, Sergei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:615762 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Satapathy, Suresh Chandra. editor.&#160;Bhateja, Vikrant. editor. (orcid)0000-0002-3259-8874&#160;Raju, K. Srujan. editor. (orcid)0000-0001-5058-4313&#160;Janakiramaiah, B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3226-4">https://doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:615972 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66284-8">https://doi.org/10.1007/978-3-319-66284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616288 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611601 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779&#160;Chida, Koji. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612752 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66266-4">https://doi.org/10.1007/978-3-319-66266-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617319 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Rak, Jacek. editor.&#160;Bay, John. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;Popyack, Leonard. editor.&#160;Skormin, Victor. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618102 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:611623 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Askoxylakis, Ioannis. editor.&#160;Ioannidis, Sotiris. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meadows, Catherine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:615918 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Askoxylakis, Ioannis. editor.&#160;Ioannidis, Sotiris. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Meadows, Catherine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:610832 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ogawa, Kazuto. editor.&#160;Yoshioka, Katsunari. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611434 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Skavhaug, Amund. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335005 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Bitsch, Friedemann. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Ka&acirc;niche, Mohamed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings ent://SD_ILS/0/SD_ILS:335098 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Sakiyama, Kazuo. editor.&#160;Terada, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335098.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197419 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197420 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ortmeier, Frank. editor.&#160;Daniel, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197425 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197475 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Hanaoka, Goichiro. editor.&#160;Yamauchi, Toshihiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197479 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Thampi, Sabu M. editor.&#160;Zomaya, Albert Y. editor.&#160;Strufe, Thorsten. editor.&#160;Alcaraz Calero, Jose M. editor.&#160;Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197329 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Foresti, Sara. editor.&#160;Yung, Moti. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195586 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Flammini, Francesco. editor.&#160;Bologna, Sandro. editor.&#160;Vittorini, Valeria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195856 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Iwata, Tetsu. editor.&#160;Nishigaki, Masakatsu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193040 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Schoitsch, Erwin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15651-9">http://dx.doi.org/10.1007/978-3-642-15651-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190950 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Backes, Michael. editor.&#160;Ning, Peng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04444-1">http://dx.doi.org/10.1007/978-3-642-04444-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190960 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Buth, Bettina. editor.&#160;Rabe, Gerd. editor.&#160;Seyfarth, Till. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191078 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Mambo, Masahiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191425 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Datta, Anupam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:164757 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188894 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Harrison, Michael D. editor.&#160;Sujan, Mark-Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189294 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Matsuura, Kanta. editor.&#160;Fujisaki, Eiichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13&ndash;15, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187023 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187467 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Miyaji, Atsuko. editor.&#160;Kikuchi, Hiroaki. editor.&#160;Rannenberg, Kai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187727 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Cervesato, Iliano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Cox, I. J. (Ingemar J.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence technology in healthcare : security and privacy issues ent://SD_ILS/0/SD_ILS:574411 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Sharma, Neha (Computer scientist), editor.&#160;Srivastava, Durgesh (Computer scientist), editor.&#160;Sinwar, Deepak, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building effective privacy programs : cybersecurity from principles to practice ent://SD_ILS/0/SD_ILS:600111 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .P735 E34 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> GUARDIANS OF DATA a comprehensive guide to digital data protection. ent://SD_ILS/0/SD_ILS:554346 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Khidzir, Nik Zulkarnaen.&#160;Ahmed, Shekh Abdullah-Al-Musa.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003604679">https://www.taylorfrancis.com/books/9781003604679</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:601805 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64948-6">https://doi.org/10.1007/978-3-031-64948-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Go Where the Bugs Are Essays Dedicated to Wolfgang Reif on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:601811 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ernst, Gidon. editor. (orcid)0000-0002-3289-5764&#160;G&uuml;demann, Matthias. editor. (orcid)0000-0002-1002-6023&#160;Knapp, Alexander. editor. (orcid)0000-0002-4050-3249&#160;Nafz, Florian. editor. (orcid)0000-0001-5725-4827&#160;Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-92196-4">https://doi.org/10.1007/978-3-031-92196-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XVIII 18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607445 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-81888-2">https://doi.org/10.1007/978-3-031-81888-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2024, Volume 3 ent://SD_ILS/0/SD_ILS:609850 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ill&eacute;s, Zolt&aacute;n. editor.&#160;Verma, Chaman. editor. (orcid)0000-0002-9925-112X&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Singh, Yashwant. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6034-6">https://doi.org/10.1007/978-981-96-6034-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605415 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8013-6">https://doi.org/10.1007/978-981-97-8013-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605581 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8540-7">https://doi.org/10.1007/978-981-97-8540-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605582 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8546-9">https://doi.org/10.1007/978-981-97-8546-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605670 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75757-0">https://doi.org/10.1007/978-3-031-75757-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605671 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75764-8">https://doi.org/10.1007/978-3-031-75764-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:606350 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78023-3">https://doi.org/10.1007/978-3-031-78023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:606462 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0938-3">https://doi.org/10.1007/978-981-96-0938-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part VIII ent://SD_ILS/0/SD_ILS:606463 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0944-4">https://doi.org/10.1007/978-981-96-0944-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606477 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0891-1">https://doi.org/10.1007/978-981-96-0891-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part IX ent://SD_ILS/0/SD_ILS:606427 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0947-5">https://doi.org/10.1007/978-981-96-0947-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606436 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0875-1">https://doi.org/10.1007/978-981-96-0875-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part V ent://SD_ILS/0/SD_ILS:606437 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0935-2">https://doi.org/10.1007/978-981-96-0935-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:606438 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0941-3">https://doi.org/10.1007/978-981-96-0941-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606449 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0888-1">https://doi.org/10.1007/978-981-96-0888-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 19th International Conference, CRITIS 2024, Rome, Italy, September 18-20, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:607516 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Oliva, Gabriele. editor. (orcid)0000-0001-7257-4079&#160;Panzieri, Stefano. editor. (orcid)0000-0002-6042-5479&#160;H&auml;mmerli, Bernhard. editor. (orcid)0000-0001-6251-1154&#160;Pascucci, Federica. editor. (orcid)0000-0002-8226-0716&#160;Faramondi, Luca. editor. (orcid)0000-0002-3750-2405<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-84260-3">https://doi.org/10.1007/978-3-031-84260-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Socio-Technical Aspects in Security 12th International Workshop, STAST 2022, Copenhagen, Denmark, September 29, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:607629 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Mehrnezhad, Maryam. editor. (orcid)0000-0002-4223-6885&#160;Parkin, Simon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-83072-3">https://doi.org/10.1007/978-3-031-83072-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bring Your Own Device Security Policy Compliance Framework ent://SD_ILS/0/SD_ILS:607863 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Palanisamy, Rathika. author. (orcid)0000-0001-6495-1081&#160;Norman, Azah Anir. author.&#160;Kiah, Miss Laiha Mat. author.&#160;Herawan, Tutut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86801-6">https://doi.org/10.1007/978-3-031-86801-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607910 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Xiang, Yang. editor. (orcid)0000-0001-5252-0831&#160;Shen, Jian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4566-4">https://doi.org/10.1007/978-981-96-4566-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research 9th International Conference, SSR 2024, Kunming, China, December 16, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607991 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lu, Xianhui. editor. (orcid)0000-0001-7091-5810&#160;Mitchell, Chris J. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-87541-0">https://doi.org/10.1007/978-3-031-87541-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the Connected World Exploring Emerging Threats and Innovative Solutions ent://SD_ILS/0/SD_ILS:608011 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Thampi, Sabu M. editor. (orcid)0000-0001-6453-5520&#160;Thomas, Tony. editor. (orcid)0000-0002-9323-6607&#160;Mukherjee, Preetam. editor. (orcid)0000-0003-2549-6578&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82826-3">https://doi.org/10.1007/978-3-031-82826-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science 20th International Conference, ICDATA 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608061 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Stahlbock, Robert. editor. (orcid)0000-0002-0393-4904&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85856-7">https://doi.org/10.1007/978-3-031-85856-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:608242 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91095-1">https://doi.org/10.1007/978-3-031-91095-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:608243 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91098-2">https://doi.org/10.1007/978-3-031-91098-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques Madrid, Spain, May 4-8, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:608244 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91107-1">https://doi.org/10.1007/978-3-031-91107-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608245 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91124-8">https://doi.org/10.1007/978-3-031-91124-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:608246 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91134-7">https://doi.org/10.1007/978-3-031-91134-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Analysis and Design of Next-Generation Software Architectures Generative AI, Cybersecurity, and Cloud Computing ent://SD_ILS/0/SD_ILS:608484 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Langer, Arthur M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-76212-3">https://doi.org/10.1007/978-3-031-76212-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings ent://SD_ILS/0/SD_ILS:608577 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Mesnager, Sihem. editor. (orcid)0000-0003-4008-2031&#160;St&#259;nic&#259;, Pantelimon. editor. (orcid)0000-0002-8622-7120&#160;Debnath, Sumit Kumar. editor. (orcid)0000-0001-6374-1410&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90587-2">https://doi.org/10.1007/978-3-031-90587-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Factor Security and Safety A Behavioral Computing Approach ent://SD_ILS/0/SD_ILS:608804 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Wang, Cheng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-5194-8">https://doi.org/10.1007/978-981-96-5194-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners ent://SD_ILS/0/SD_ILS:608948 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Guo, Fuchun. author. (orcid)0000-0001-6939-7710&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Nguyen, Khoa. author.&#160;Chen, Xiaofeng. author.&#160;Zhao, Zhen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Security Proceedings of IDSCS 2024, Volume 2 ent://SD_ILS/0/SD_ILS:609195 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Shukla, Samiksha. editor. (orcid)0000-0003-2690-8175&#160;Sayama, Hiroki. editor. (orcid)0000-0002-2670-5864&#160;Tiwari, Kapil. editor.&#160;Kureethara, Joseph Varghese. editor. (orcid)0000-0001-5030-3948&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4883-2">https://doi.org/10.1007/978-981-96-4883-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:572623 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimum spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:574605 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605517 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64954-7">https://doi.org/10.1007/978-3-031-64954-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XX 20th IFIP WG 11.9 International Conference, New Delhi, India, January 4-5, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:606873 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kurkowski, Elizabeth. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71025-4">https://doi.org/10.1007/978-3-031-71025-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606946 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Li, Wenjuan. editor. (orcid)0000-0003-3745-5669&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Lopez, Javier. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80419-9">https://doi.org/10.1007/978-3-031-80419-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings ent://SD_ILS/0/SD_ILS:607075 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Horn Iwaya, Leonardo. editor. (orcid)0000-0001-9005-0543&#160;Kamm, Liina. editor. (orcid)0000-0003-1479-2195&#160;Martucci, Leonardo. editor. (orcid)0000-0002-9980-3473&#160;Pulls, Tobias. editor. (orcid)0000-0001-6459-8409&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-79007-2">https://doi.org/10.1007/978-3-031-79007-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:607144 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lee, Jong-Hyouk. editor. (orcid)0000-0002-1753-1284&#160;Emura, Keita. editor. (orcid)0000-0002-8969-3581&#160;Lee, Sokjoon. editor. (orcid)0000-0002-4632-8322&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-1624-4">https://doi.org/10.1007/978-981-96-1624-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security in a Connected World Celebrating the Life and Work of Ed Dawson ent://SD_ILS/0/SD_ILS:607615 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Boyd, Colin. editor.&#160;Safavi-Naini, Reihaneh. editor. (orcid)0000-0002-1697-3590&#160;Simpson, Leonie. editor. (orcid)0000-0001-8434-9741&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-83490-5">https://doi.org/10.1007/978-3-031-83490-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607656 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Song, Houbing Herbert. editor. (orcid)0000-0003-2631-9223&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X&#160;Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345&#160;Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3531-3">https://doi.org/10.1007/978-981-96-3531-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks and Big Data 10th International Symposium, SocialSec 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607720 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861&#160;Aldwairi, Monther. editor. (orcid)0000-0003-1150-2404&#160;Raymond Choo, Kim-Kwang. editor. (orcid)0000-0001-9208-5336&#160;Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345&#160;Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3774-4">https://doi.org/10.1007/978-981-96-3774-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part V ent://SD_ILS/0/SD_ILS:608267 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91092-0">https://doi.org/10.1007/978-3-031-91092-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VIII ent://SD_ILS/0/SD_ILS:608268 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91101-9">https://doi.org/10.1007/978-3-031-91101-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:608269 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91131-6">https://doi.org/10.1007/978-3-031-91131-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:608363 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lin, Dongdai. editor.&#160;Wang, Meiqin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4731-6">https://doi.org/10.1007/978-981-96-4731-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:608364 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lin, Dongdai. editor.&#160;Wang, Meiqin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4734-7">https://doi.org/10.1007/978-981-96-4734-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608986 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95764-2">https://doi.org/10.1007/978-3-031-95764-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Systems and Security Proceedings of ICISS 2024 ent://SD_ILS/0/SD_ILS:609937 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Giri, Debasis. editor.&#160;Ho, Anthony T. S. editor.&#160;Ochiai, Hideki. editor.&#160;Mandal, Mrinal. editor.&#160;Sinha, Koushik. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4273-1">https://doi.org/10.1007/978-981-96-4273-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Processing and Networking Proceedings of ICDPN 2024, Volume 2 ent://SD_ILS/0/SD_ILS:609939 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Swaroop, Abhishek. editor.&#160;Virdee, Bal. editor. (orcid)0000-0001-7203-0039&#160;Correia, S&eacute;rgio Duarte. editor.&#160;Valicek, Jan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-5535-9">https://doi.org/10.1007/978-981-96-5535-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Big Data Analytics Proceedings of IDBA 2025, Volume 2 ent://SD_ILS/0/SD_ILS:610063 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Mishra, Durgesh. editor.&#160;Yang, Xin She. editor. (orcid)0000-0001-8231-5556&#160;Unal, Aynur. editor.&#160;Jat, Dharm Singh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-05373-2">https://doi.org/10.1007/978-3-032-05373-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605357 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8016-7">https://doi.org/10.1007/978-981-97-8016-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606243 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78017-2">https://doi.org/10.1007/978-3-031-78017-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606283 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78020-2">https://doi.org/10.1007/978-3-031-78020-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606319 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78011-0">https://doi.org/10.1007/978-3-031-78011-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part IV ent://SD_ILS/0/SD_ILS:606498 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0894-2">https://doi.org/10.1007/978-981-96-0894-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609005 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95767-3">https://doi.org/10.1007/978-3-031-95767-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609039 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95761-1">https://doi.org/10.1007/978-3-031-95761-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Processing and Networking Proceedings of ICDPN 2024, Volume 1 ent://SD_ILS/0/SD_ILS:609233 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Swaroop, Abhishek. editor.&#160;Virdee, Bal. editor. (orcid)0000-0001-7203-0039&#160;Correia, S&eacute;rgio Duarte. editor.&#160;Valicek, Jan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3102-5">https://doi.org/10.1007/978-981-96-3102-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609259 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609277 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609291 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:609486 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Morogan, Luciana. editor. (orcid)0000-0002-3119-152X&#160;Roenne, Peter. editor. (orcid)0000-0002-2785-8301&#160;Bica, Ion. editor. (orcid)0000-0002-0890-4376&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-87760-5">https://doi.org/10.1007/978-3-031-87760-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Security Proceedings of IDSCS 2024, Volume 1 ent://SD_ILS/0/SD_ILS:609818 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Shukla, Samiksha. editor. (orcid)0000-0003-2690-8175&#160;Sayama, Hiroki. editor. (orcid)0000-0002-2670-5864&#160;Tiwari, Kapil. editor.&#160;Kureethara, Joseph Varghese. editor. (orcid)0000-0001-5030-3948&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4880-1">https://doi.org/10.1007/978-981-96-4880-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : AI and governance ent://SD_ILS/0/SD_ILS:584311 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : third party risk management ent://SD_ILS/0/SD_ILS:584312 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cybersecurity A Multidisciplinary Challenge ent://SD_ILS/0/SD_ILS:601841 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Sharp, Robin. author. (orcid)0000-0002-8593-267X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings ent://SD_ILS/0/SD_ILS:601940 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fritsch, Lothar. editor.&#160;Hassan, Ismail. editor.&#160;Paintsil, Ebenezer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47748-5">https://doi.org/10.1007/978-3-031-47748-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XVII 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13-14, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602208 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-49585-4">https://doi.org/10.1007/978-3-031-49585-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Face Recognition ent://SD_ILS/0/SD_ILS:602213 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Li, Stan Z. editor.&#160;Jain, Anil K. editor.&#160;Deng, Jiankang. editor. (orcid)0000-0002-3709-6216&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-43567-6">https://doi.org/10.1007/978-3-031-43567-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 6th International Conference, FCS 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602287 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Yang, Haomiao. editor.&#160;Lu, Rongxing. editor. (orcid)0000-0001-5720-0941&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9331-4">https://doi.org/10.1007/978-981-99-9331-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602288 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Shao, Jun. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9614-8">https://doi.org/10.1007/978-981-99-9614-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602342 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kim, Howon. editor.&#160;Youn, Jonghee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-8024-6">https://doi.org/10.1007/978-981-99-8024-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Planning A Practical Approach ent://SD_ILS/0/SD_ILS:602364 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lincke, Susan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-43118-0">https://doi.org/10.1007/978-3-031-43118-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses ent://SD_ILS/0/SD_ILS:602378 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602386 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Manulis, Mark. editor. (orcid)0000-0002-1512-9670&#160;Maimu&#355;, Diana. editor.&#160;Te&#351;eleanu, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-52947-4">https://doi.org/10.1007/978-3-031-52947-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602673 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0945-8">https://doi.org/10.1007/978-981-97-0945-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602684 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0942-7">https://doi.org/10.1007/978-981-97-0942-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:603492 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58723-8">https://doi.org/10.1007/978-3-031-58723-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Execution Environments ent://SD_ILS/0/SD_ILS:604058 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Shepherd, Carlton. author.&#160;Markantonakis, Konstantinos. author. (orcid)0000-0003-3975-9033&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55561-9">https://doi.org/10.1007/978-3-031-55561-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Tenth International Conference on Mathematics and Computing ICMC 2024, Volume 2 ent://SD_ILS/0/SD_ILS:604176 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Giri, Debasis. editor.&#160;Vaidya, Jaideep. editor.&#160;Ponnusamy, S. editor. (orcid)0000-0002-3699-2713&#160;Lin, Zhiqiang. editor.&#160;Joshi, Karuna Pande. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2069-9">https://doi.org/10.1007/978-981-97-2069-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 18th International Conference, CRITIS 2023, Helsinki Region, Finland, September 13-15, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:604072 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Pickl, Stefan. editor. (orcid)0000-0001-5549-6259&#160;H&auml;mmerli, Bernhard. editor. (orcid)0000-0001-6251-1154&#160;Mattila, P&auml;ivi. editor. (orcid)0000-0002-1683-2392&#160;Sevillano, Annaleena. editor. (orcid)0000-0002-8204-1791&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62139-0">https://doi.org/10.1007/978-3-031-62139-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604086 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61489-7">https://doi.org/10.1007/978-3-031-61489-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security, Privacy and Digital Forensics Select Proceedings of the International Conference, ICISPD 2022 ent://SD_ILS/0/SD_ILS:601918 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Patel, Sankita J. editor.&#160;Chaudhary, Naveen Kumar. editor.&#160;Gohil, Bhavesh N. editor.&#160;Iyengar, S. S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-5091-1">https://doi.org/10.1007/978-981-99-5091-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Approaches in IoT and Machine Learning for Cyber Security Latest Trends in AI ent://SD_ILS/0/SD_ILS:602103 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Gunjan, Vinit Kumar. editor. (orcid)0000-0002-3222-4186&#160;Ansari, Mohd Dilshad. editor.&#160;Usman, Mohammed. editor.&#160;Nguyen, ThiDieuLinh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-09955-7">https://doi.org/10.1007/978-3-031-09955-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CyberSecurity in a DevOps Environment From Requirements to Monitoring ent://SD_ILS/0/SD_ILS:602151 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Sadovykh, Andrey. editor.&#160;Truscan, Dragos. editor.&#160;Mallouli, Wissam. editor.&#160;Cavalli, Ana Rosa. editor.&#160;Seceleanu, Cristina. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42212-6">https://doi.org/10.1007/978-3-031-42212-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementation and Analysis of Ciphers in Quantum Computing ent://SD_ILS/0/SD_ILS:603263 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Baksi, Anubhab. author.&#160;Jang, Kyungbae. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0025-7">https://doi.org/10.1007/978-981-97-0025-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings ent://SD_ILS/0/SD_ILS:603309 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kim, Dan Dongseong. editor. (orcid)0000-0003-2605-187X&#160;Chen, Chao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2458-1">https://doi.org/10.1007/978-981-97-2458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Security Proceedings of IDSCS 2023 ent://SD_ILS/0/SD_ILS:603729 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Shukla, Samiksha. editor. (orcid)0000-0003-2690-8175&#160;Sayama, Hiroki. editor. (orcid)0000-0002-2670-5864&#160;Kureethara, Joseph Varghese. editor. (orcid)0000-0001-5030-3948&#160;Mishra, Durgesh Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0975-5">https://doi.org/10.1007/978-981-97-0975-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2024 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings ent://SD_ILS/0/SD_ILS:604188 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Vaudenay, Serge. editor. (orcid)0000-0001-9185-1449&#160;Petit, Christophe. editor. (orcid)0000-0003-3482-6743&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64381-1">https://doi.org/10.1007/978-3-031-64381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of ICE-TEAS 2024, Volume 1 ent://SD_ILS/0/SD_ILS:605354 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Rathore, Vijay Singh. editor.&#160;Manuel R. S. Tavares, Jo&atilde;o. editor. (orcid)0000-0001-7603-6526&#160;Tuba, Eva. editor.&#160;Devedzic, Vladan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-3745-1">https://doi.org/10.1007/978-981-97-3745-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2023, Volume 2 ent://SD_ILS/0/SD_ILS:605674 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ill&eacute;s, Zolt&aacute;n. editor.&#160;Verma, Chaman. editor. (orcid)0000-0002-9925-112X&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-3442-9">https://doi.org/10.1007/978-981-97-3442-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2023, Volume 3 ent://SD_ILS/0/SD_ILS:606246 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Singh, Yashwant. editor.&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014&#160;Kolekar, Maheshkumar H. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-7862-1">https://doi.org/10.1007/978-981-97-7862-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606703 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chen, Biwen. editor. (orcid)0000-0002-7314-8271&#160;Fu, Xinwen. editor. (orcid)0000-0003-2391-7789&#160;Huang, Min. editor. (orcid)0000-0003-2744-0455&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0151-6">https://doi.org/10.1007/978-981-96-0151-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606704 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Chen, Biwen. editor. (orcid)0000-0002-7314-8271&#160;Fu, Xinwen. editor. (orcid)0000-0003-2391-7789&#160;Huang, Min. editor. (orcid)0000-0003-2744-0455&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0154-7">https://doi.org/10.1007/978-981-96-0154-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:586024 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Watermarking Latest Developments and Trends ent://SD_ILS/0/SD_ILS:602650 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kumar Sahu, Aditya. editor. (orcid)0000-0003-4257-0688&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9803-6">https://doi.org/10.1007/978-981-99-9803-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Big Data Analytics Proceedings of IDBA 2023 ent://SD_ILS/0/SD_ILS:602901 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Mishra, Durgesh. editor.&#160;Yang, Xin She. editor. (orcid)0000-0001-8231-5556&#160;Unal, Aynur. editor.&#160;Jat, Dharm Singh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9179-2">https://doi.org/10.1007/978-981-99-9179-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Digital Forensics A Guide to Theory, Research and Applications ent://SD_ILS/0/SD_ILS:602993 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;K&auml;vrestad, Joakim. author.&#160;Birath, Marcus. author. (orcid)0000-0001-5692-4008&#160;Clarke, Nathan. author. (orcid)0000-0002-3595-3800&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53649-6">https://doi.org/10.1007/978-3-031-53649-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:603382 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58716-0">https://doi.org/10.1007/978-3-031-58716-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:603383 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58737-5">https://doi.org/10.1007/978-3-031-58737-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V ent://SD_ILS/0/SD_ILS:603384 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58740-5">https://doi.org/10.1007/978-3-031-58740-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:603385 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58751-1">https://doi.org/10.1007/978-3-031-58751-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:603386 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58754-2">https://doi.org/10.1007/978-3-031-58754-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safe, Secure, Ethical, Responsible Technologies and Emerging Applications First EAI International Conference, SAFER-TEA 2023, Yaound&eacute;, Cameroon, October 25-27, 2023, Proceedings ent://SD_ILS/0/SD_ILS:603424 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tchakounte, Franklin. editor.&#160;Atemkeng, Marcellin. editor.&#160;Rajagopalan, Rajeswari Pillai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-56396-6">https://doi.org/10.1007/978-3-031-56396-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604032 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61486-6">https://doi.org/10.1007/978-3-031-61486-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why CISOs fail ent://SD_ILS/0/SD_ILS:577207 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Engel, Barak, author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:603434 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58734-4">https://doi.org/10.1007/978-3-031-58734-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age ent://SD_ILS/0/SD_ILS:603456 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kestner, Peter. author. (orcid)0009-0002-0437-9487&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-43879-1">https://doi.org/10.1007/978-3-658-43879-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Tenth International Conference on Mathematics and Computing ICMC 2024, Volume 1 ent://SD_ILS/0/SD_ILS:604175 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Giri, Debasis. editor.&#160;Vaidya, Jaideep. editor.&#160;Ponnusamy, S. editor. (orcid)0000-0002-3699-2713&#160;Lin, Zhiqiang. editor.&#160;Joshi, Karuna Pande. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2066-8">https://doi.org/10.1007/978-981-97-2066-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2023, Volume 1 ent://SD_ILS/0/SD_ILS:604279 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Singh, Yashwant. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Kar, Arpan Kumar. editor. (orcid)0000-0003-4186-4887&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2839-8">https://doi.org/10.1007/978-981-97-2839-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of 3rd International Conference on Smart Computing and Cyber Security Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2023) ent://SD_ILS/0/SD_ILS:604469 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Pattnaik, Prasant Kumar. editor.&#160;Sain, Mangal. editor.&#160;Al-Absi, Ahmed A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0573-3">https://doi.org/10.1007/978-981-97-0573-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Systems 19th EAI International Conference, QShine 2023, Shenzhen, China, October 8 - 9, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604755 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Leung, Victor C.M. editor.&#160;Li, Hezhang. editor.&#160;Hu, Xiping. editor.&#160;Ning, Zhaolong. editor. (orcid)0000-0002-7870-5524&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65123-6">https://doi.org/10.1007/978-3-031-65123-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Systems 19th EAI International Conference, QShine 2023, Shenzhen, China, October 8 - 9, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604756 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Leung, Victor C.M. editor.&#160;Li, Hezhang. editor.&#160;Hu, Xiping. editor.&#160;Ning, Zhaolong. editor. (orcid)0000-0002-7870-5524&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65126-7">https://doi.org/10.1007/978-3-031-65126-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Intelligent Systems Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 1 ent://SD_ILS/0/SD_ILS:606730 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Bhateja, Vikrant. editor.&#160;Lin, Hong. editor.&#160;Simic, Milan. editor.&#160;Attique Khan, Muhammad. editor. (orcid)0000-0001-5723-3858&#160;Garg, Harish. editor. (orcid)0000-0001-9099-8422<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-4892-1">https://doi.org/10.1007/978-981-97-4892-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchains A Handbook on Fundamentals, Platforms and Applications ent://SD_ILS/0/SD_ILS:602803 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ruj, Sushmita. editor.&#160;Kanhere, Salil S. editor.&#160;Conti, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks and IoT First International Artificial Intelligence Conference, IAIC 2023, Nanjing, China, November 25-27, 2023, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:603140 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Jin, Hai. editor. (orcid)0000-0002-3934-7605&#160;Pan, Yi. editor.&#160;Lu, Jianfeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-1332-5">https://doi.org/10.1007/978-981-97-1332-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware Detection and Adversarial Methods ent://SD_ILS/0/SD_ILS:603645 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Niu, Weina. author.&#160;Zhang, Xiaosong. author.&#160;Yan, Ran. author.&#160;Gong, Jiacheng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-1459-9">https://doi.org/10.1007/978-981-97-1459-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 - March 1, 2024, Proceedings ent://SD_ILS/0/SD_ILS:603949 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Bouzefrane, Samia. editor. (orcid)0000-0002-0979-1289&#160;Sauveron, Damien. editor. (orcid)0000-0001-7948-6143&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-60391-4">https://doi.org/10.1007/978-3-031-60391-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605093 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Galdi, Clemente. editor. (orcid)0000-0002-2988-700X&#160;Phan, Duong Hieu. editor. (orcid)0000-0003-1136-4064&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71070-4">https://doi.org/10.1007/978-3-031-71070-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605094 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Galdi, Clemente. editor. (orcid)0000-0002-2988-700X&#160;Phan, Duong Hieu. editor. (orcid)0000-0003-1136-4064&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71073-5">https://doi.org/10.1007/978-3-031-71073-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of ICE-TEAS 2024, Volume 2 ent://SD_ILS/0/SD_ILS:605178 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Rathore, Vijay Singh. editor.&#160;Piuri, Vincenzo. editor. (orcid)0000-0003-3178-8198&#160;Babo, Rosalina. editor. (orcid)0000-0002-8505-8783&#160;Tiwari, Vivek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-3991-2">https://doi.org/10.1007/978-981-97-3991-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and Identity Access Management ent://SD_ILS/0/SD_ILS:527374 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Rawal, Bharat S. author.&#160;Manogaran, Gunasekaran. author.&#160;Peter, Alexender. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023 ent://SD_ILS/0/SD_ILS:528415 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Giri, Debasis. editor.&#160;Gollmann, Dieter. editor.&#160;Ponnusamy, S. editor.&#160;Kouichi, Sakurai. editor.&#160;Stanimirovi&#263;, Predrag S. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing and Applications Proceedings of ICDIC 2020 ent://SD_ILS/0/SD_ILS:528678 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Rao, B. Narendra Kumar. editor.&#160;Balasubramanian, R. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Nayak, Richi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2023 ent://SD_ILS/0/SD_ILS:529021 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ranganathan, G. editor.&#160;EL Allioui, Youssouf. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) ent://SD_ILS/0/SD_ILS:529055 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Schiffner, Stefan. editor.&#160;Ziegler, S&eacute;bastien. editor. (orcid)0000-0001-7255-4975&#160;Jensen, Meiko. editor. (orcid)0009-0003-2397-9813&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1 ent://SD_ILS/0/SD_ILS:529113 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Rathore, Vijay Singh. editor.&#160;Tavares, Jo&atilde;o Manuel R. S. editor.&#160;Piuri, Vincenzo. editor.&#160;Surendiran, B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 ent://SD_ILS/0/SD_ILS:526849 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2022 ent://SD_ILS/0/SD_ILS:526883 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ranganathan, G. editor.&#160;Fernando, Xavier. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in practice : establish and operationalize a holistic data privacy program ent://SD_ILS/0/SD_ILS:560699 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tang, Alan, (Information Security), author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1 ent://SD_ILS/0/SD_ILS:529010 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Singh, Yashwant. editor.&#160;Singh, Pradeep Kumar. editor.&#160;Kolekar, Maheshkumar H. editor.&#160;Kar, Arpan Kumar. editor.&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software security : concepts &amp; practices ent://SD_ILS/0/SD_ILS:570473 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Khan, Suhel Ahmad, author.&#160;Kumar, Rajeev, author.&#160;Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practitioner's guide to cybersecurity and data protection : how to ensure client confidentiality ent://SD_ILS/0/SD_ILS:550244 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Knibbs, Catherine, editor.&#160;Hibberd, Gary, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003364184">https://www.taylorfrancis.com/books/9781003364184</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:553885 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for coaches and therapists : a practical guide for protecting client data ent://SD_ILS/0/SD_ILS:588664 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Fouracres, Alexandra J. S., author.<br/>Preferred Shelf Number&#160;RC455.2 .M38 F88 2022 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003184805">https://www.taylorfrancis.com/books/9781003184805</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Security Hippie. ent://SD_ILS/0/SD_ILS:587563 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Engel, Barak.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing security foundations and challenges ent://SD_ILS/0/SD_ILS:580601 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions ent://SD_ILS/0/SD_ILS:596265 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number&#160;HD61.5 .M66 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> It's your digital life ent://SD_ILS/0/SD_ILS:565418 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Govindarajulu, Giri, author.&#160;Ramaswami, Shyam Sundar, author.&#160;Vasudevan, Shriram K., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003144199">https://www.taylorfrancis.com/books/9781003144199</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:549829 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2021 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks. ent://SD_ILS/0/SD_ILS:567328 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Maleh, Yassine, 1987-&#160;Sahid, Abdelkebir, 1983-&#160;Alazab, Mamoun, 1980-&#160;Belaissaoui, Mustapha, 1968-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks. ent://SD_ILS/0/SD_ILS:549396 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Maleh, Yassine, 1987-&#160;Sahid, Abdelkebir, 1983-&#160;Alazab, Mamoun, 1980-&#160;Belaissaoui, Mustapha, 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection ensuring data availability ent://SD_ILS/0/SD_ILS:582517 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;De Guise, Preston.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367463496">https://www.taylorfrancis.com/books/9780367463496</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486939 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global cyber security labor shortage and international business risk ent://SD_ILS/0/SD_ILS:481810 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Christiansen, Bryan, 1960- editor.&#160;Piekarz, Agnieszka, 1990- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483099 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131&#160;Lopez, Javier. editor. (orcid)0000-0001-8066-9991&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:483593 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Flammini, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486019 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Shen, Bazhong. editor.&#160;Wang, Baocang. editor. (orcid)0000-0002-2554-4464&#160;Han, Jinguang. editor. (orcid)0000-0002-4993-9452&#160;Yu, Yong. editor. (orcid)0000-0003-0667-077X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:398966 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lin, Xiaodong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:399250 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;NG, Chee Keong. author.&#160;Pan, Lei. author.&#160;Xiang, Yang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399694 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252&#160;Raffai, Maria. editor. (orcid)0000-0001-6934-6366&#160;Doucek, Petr. editor. (orcid)0000-0002-5647-661X&#160;Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:399974 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Somani, Gaurav. editor.&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:400508 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Wan, Jiafu. editor.&#160;Lin, Kai. editor.&#160;Zeng, Delu. editor.&#160;Li, Jin. editor.&#160;Xiang, Yang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:400767 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Karuppayah, Shankar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400846 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402017 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Imine, Abdessamad. editor.&#160;Fernandez, Jos&eacute; M. editor. (orcid)0000-0001-9836-3595&#160;Marion, Jean-Yves. editor.&#160;Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401734 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:399211 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Guo, Fuchun. author.&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Mu, Yi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400126 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401491 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Hansen, Marit. editor.&#160;Kosta, Eleni. editor.&#160;Nai-Fovino, Igor. editor.&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402007 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Gal-Oz, Nurit. editor.&#160;Lewis, Peter R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401948 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Matou&scaron;ek, Petr. editor.&#160;Schmiedecker, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400949 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401000 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;You, Ilsun. editor.&#160;Leu, Fang-Yie. editor.&#160;Chen, Hsing-Chung. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402205 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Sun, Guanglu. editor.&#160;Liu, Shuai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:593721 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Song, Houbing, editor.&#160;Fink, Glenn A., editor.&#160;Jeschke, Sabina, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43923 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unauthorized Access : The Crisis in Online Privacy and Security. ent://SD_ILS/0/SD_ILS:543688 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Sloan, Robert, author.&#160;CRC Press LLC.<br/>Preferred Shelf Number&#160;TK5105.878 .S59 2017<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429093791">https://www.taylorfrancis.com/books/9780429093791</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SECURITY STRATEGY : from requirements to reality. ent://SD_ILS/0/SD_ILS:545098 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;STACKPOLE, BILL.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:539922 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:610761 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ceci, Michelangelo. editor.&#160;Hollm&eacute;n, Jaakko. editor.&#160;Todorovski, Ljup&#269;o. editor.&#160;Vens, Celine. editor.&#160;D&#382;eroski, Sa&scaron;o. editor. (orcid)0000-0003-2363-712X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71246-8">https://doi.org/10.1007/978-3-319-71246-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> String Analysis for Software Verification and Security ent://SD_ILS/0/SD_ILS:611157 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Bultan, Tevfik. author.&#160;Yu, Fang. author.&#160;Alkhalaf, Muath. author.&#160;Aydin, Abdulbaki. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68670-7">https://doi.org/10.1007/978-3-319-68670-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:611241 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Boroojeni, Kianoosh G. author.&#160;Amini, M. Hadi. author.&#160;Iyengar, S. S. author. (orcid)0000-0003-2944-8178&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45050-6">https://doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach ent://SD_ILS/0/SD_ILS:611465 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Lin, Chung-Wei. author.&#160;Sangiovanni-Vincentelli, Alberto. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-51328-7">https://doi.org/10.1007/978-3-319-51328-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:615847 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Saini, H. S. editor.&#160;Sayal, Rishi. editor.&#160;Rawat, Sandeep Singh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3818-1">https://doi.org/10.1007/978-981-10-3818-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Differential Privacy and Applications ent://SD_ILS/0/SD_ILS:616482 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Zhu, Tianqing. author.&#160;Li, Gang. author.&#160;Zhou, Wanlei. author.&#160;Yu, Philip S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-62004-6">https://doi.org/10.1007/978-3-319-62004-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616653 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Livraga, Giovanni. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68063-7">https://doi.org/10.1007/978-3-319-68063-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:616832 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Mandal, Jyotsna Kumar. editor. (orcid)0000-0001-9447-647X&#160;Satapathy, Suresh Chandra. editor.&#160;Sanyal, Manas Kumar. editor.&#160;Bhateja, Vikrant. editor. (orcid)0000-0002-3259-8874&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-2035-3">https://doi.org/10.1007/978-981-10-2035-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618161 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ceci, Michelangelo. editor.&#160;Hollm&eacute;n, Jaakko. editor.&#160;Todorovski, Ljup&#269;o. editor.&#160;Vens, Celine. editor.&#160;D&#382;eroski, Sa&scaron;o. editor. (orcid)0000-0003-2363-712X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71249-9">https://doi.org/10.1007/978-3-319-71249-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618120 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61437-3">https://doi.org/10.1007/978-3-319-61437-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611592 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Metrics ent://SD_ILS/0/SD_ILS:613251 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Wang, Lingyu. author. (orcid)0000-0002-7441-7541&#160;Jajodia, Sushil. author. (orcid)0000-0003-3210-558X&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Neural Information Processing 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:613301 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Liu, Derong. editor.&#160;Xie, Shengli. editor.&#160;Li, Yuanqing. editor.&#160;Zhao, Dongbin. editor.&#160;El-Alfy, El-Sayed M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70090-8">https://doi.org/10.1007/978-3-319-70090-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory and Models for Cyber Situation Awareness ent://SD_ILS/0/SD_ILS:616045 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Liu, Peng. editor.&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:618461 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Altun, Yasemin. editor.&#160;Das, Kamalika. editor.&#160;Mielik&auml;inen, Taneli. editor.&#160;Malerba, Donato. editor. (orcid)0000-0001-8432-4608&#160;Stefanowski, Jerzy. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71273-4">https://doi.org/10.1007/978-3-319-71273-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Neural Information Processing 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:612047 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Liu, Derong. editor.&#160;Xie, Shengli. editor.&#160;Li, Yuanqing. editor.&#160;Zhao, Dongbin. editor.&#160;El-Alfy, El-Sayed M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70087-8">https://doi.org/10.1007/978-3-319-70087-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Concepts for Intelligent Vision Systems 18th International Conference, ACIVS 2017, Antwerp, Belgium, September 18-21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613753 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Blanc-Talon, Jacques. editor. (orcid)0009-0003-3237-8753&#160;Penne, Rudi. editor.&#160;Philips, Wilfried. editor.&#160;Popescu, Dan. editor.&#160;Scheunders, Paul. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70353-4">https://doi.org/10.1007/978-3-319-70353-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Aspects of Computer and Information Sciences 7th International Conference, MACIS 2017, Vienna, Austria, November 15-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613759 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Bl&ouml;mer, Johannes. editor.&#160;Kotsireas, Ilias S. editor.&#160;Kutsia, Temur. editor. (orcid)0000-0003-4084-7380&#160;Simos, Dimitris E. editor. (orcid)0000-0001-8588-1924&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72453-9">https://doi.org/10.1007/978-3-319-72453-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Verifiable Privacy Protection for Vehicular Communication Systems ent://SD_ILS/0/SD_ILS:617820 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;F&ouml;rster, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-18550-3">https://doi.org/10.1007/978-3-658-18550-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:617853 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Mayes, Keith. editor.&#160;Markantonakis, Konstantinos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:618109 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;Hartenstein, Hannes. editor.&#160;Herrera-Joancomart&iacute;, Jordi. editor. (orcid)0000-0002-4935-4681&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools ent://SD_ILS/0/SD_ILS:618425 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Bhuyan, Monowar H. author.&#160;Bhattacharyya, Dhruba K. author.&#160;Kalita, Jugal K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65188-0">https://doi.org/10.1007/978-3-319-65188-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:617656 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Rice, Mason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Raggo, Michael T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebasti&aacute;n, Spain, July 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616097 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Caballero, Juan. editor.&#160;Zurutuza, Urko. editor.&#160;Rodr&iacute;guez, Ricardo J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:618129 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;B&eacute;cue, Adrien. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Sensor Networks Security, Coverage, and Localization ent://SD_ILS/0/SD_ILS:611390 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Selmic, Rastko R. author.&#160;Phoha, Vir V. author.&#160;Serwadda, Abdul. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611549 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:613967 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Jakobsson, Markus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:614393 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Wang, Cliff. editor.&#160;Gerdes, Ryan M. editor.&#160;Guan, Yong. editor.&#160;Kasera, Sneha Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616156 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Barthe, Gilles. editor.&#160;Markatos, Evangelos. editor.&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616421 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tryfonas, Theo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:611803 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Martinelli, Fabio. editor.&#160;Suri, Neeraj. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:611890 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:612882 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Yu, Shui. editor.&#160;Guo, Song. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprises ent://SD_ILS/0/SD_ILS:617806 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Pierer, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-15046-4">https://doi.org/10.1007/978-3-658-15046-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:617849 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:617621 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Rice, Mason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:355576 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Freund, Jack, author.&#160;Jones, Jack, author.<br/>Preferred Shelf Number&#160;ONLINE(355576.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:530149 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Candaele, Bernard. editor.&#160;Soudris, Dimitrios. editor.&#160;Anagnostopoulos, Iraklis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:543619 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;TK5105.59 .P463 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881606">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:618581 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Nayak, Umesha. author.&#160;Rao, Umesh Hodeghatta. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:540169 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Raghunathan, Balaji., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R338 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Williams, Barry L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 .W5495 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Responsive Security ent://SD_ILS/0/SD_ILS:542438 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kang, Meng-Chow, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;HD30.38 .B76 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:147602 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Raggo, Michael T.&#160;Hosmer, Chet.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:306649 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kane, Greg, editor of compilation.&#160;Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Tibble, Ian., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:541595 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Scherling, Mark., author.<br/>Preferred Shelf Number&#160;HF5548.37 .S34 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:299263 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Halpert, Ben, 1986-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:313297 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA76.9 A25 P45 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Trinckes, John J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T75 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2026-03-21T04:25:34Z 2026-03-21T04:25:34Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>