Search Results for Computer Security. - Narrowed by: Electronic books.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300?
2026-01-31T06:26:48Z
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer science security : concepts and tools
ent://SD_ILS/0/SD_ILS:597739
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number QA76.9 .A25 Z35 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematics for the Digital Systems Engineer Essentials for Modern Cryptography, Computer Security and Communications Technology.
ent://SD_ILS/0/SD_ILS:600431
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Mitchell, Chris J.<br/>Preferred Shelf Number XX(600431.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
ent://SD_ILS/0/SD_ILS:297432
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat intelligence
ent://SD_ILS/0/SD_ILS:598051
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Lee, Martin (Computer security expert), author.<br/>Preferred Shelf Number TK5105.59 .L47 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119861775</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safeguarding satellite communications : issues, challenges, and solutions
ent://SD_ILS/0/SD_ILS:600245
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author An, Jianpin, author.<br/>Preferred Shelf Number TK5104 .A53 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep learning for intrusion detection : techniques and applications
ent://SD_ILS/0/SD_ILS:600319
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Masoodi, Faheem Syeed, editor. Bamhdi, Alwi, editor.<br/>Preferred Shelf Number TK5105.59 .D44 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer memories 1 : core concepts
ent://SD_ILS/0/SD_ILS:600350
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Darche, Philippe, author.<br/>Preferred Shelf Number TK7895 .M4 D37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394427734</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital twins and cybersecurity : safeguarding the future of connected systems
ent://SD_ILS/0/SD_ILS:599615
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Naveen, Palanichamy, author. Maheswar, R., author. Ragupathy, U.S., author.<br/>Preferred Shelf Number QA76.9 .C65 N38 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272501</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The impact of algorithmic technologies on healthcare
ent://SD_ILS/0/SD_ILS:599726
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Dubey, Parul, editor Madankar, Mangala, editor Dubey, Pushkar, editor Hung, Bui Thanh, editor<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305490</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Time-Sensitive Systems.
ent://SD_ILS/0/SD_ILS:599899
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Choudhury, Tanupriy. Choudhury, Tanupriya/Singh, Rahul Kuma. Tomar, Ravi.<br/>Preferred Shelf Number TA168<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394197798</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimizing biofuel production with artificial intelligence
ent://SD_ILS/0/SD_ILS:599901
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Kuila, Arindam, editor. Kumar, Depak, editor.<br/>Preferred Shelf Number TP339 .O68 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394301287</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next-generation systems and secure computing
ent://SD_ILS/0/SD_ILS:599779
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Preferred Shelf Number QA76.9 .A25 N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and cybersecurity in healthcare
ent://SD_ILS/0/SD_ILS:599741
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Agrawal, Rashmi, editor.<br/>Preferred Shelf Number R859.7 .A78 A78 2025 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394229826</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communication networks in smart power grids
ent://SD_ILS/0/SD_ILS:599871
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Zhou, Boyang, author.<br/>Preferred Shelf Number TK3105 .Z46 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Preferred Shelf Number TK3001 .M37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Alice and Bob learn secure coding
ent://SD_ILS/0/SD_ILS:599664
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Janca, Tanya. author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Edge of intelligence : exploring the frontiers of AI at the edge
ent://SD_ILS/0/SD_ILS:599759
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Mahajan, Shubham, editor. Munirathinam, Sathyan, editor. Raj, Pethuru, editor.<br/>Preferred Shelf Number Q335 .E34 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P76 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense : best practices for digital safety
ent://SD_ILS/0/SD_ILS:600003
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Edwards, Jason, author.<br/>Preferred Shelf Number QA76.9 .A25 E39 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Conversational artificial intelligence
ent://SD_ILS/0/SD_ILS:598905
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Rawat, Romil, 1986- editor. Chakrawarti, Rajesh Kumar, editor Sarangi, Sanjaya Kumar, editor Vyas, Piyush, editor Alamanda, Mary Sowjanya, editor<br/>Preferred Shelf Number Q335 .C66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity guide to governance, risk, and compliance
ent://SD_ILS/0/SD_ILS:598945
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Edwards, Jason (Cybersecurity expert), author. Weaver, Griffin, author.<br/>Preferred Shelf Number HD30.38 .E34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394250226</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stepping through cybersecurity risk management : a systems thinking approach
ent://SD_ILS/0/SD_ILS:599021
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
ent://SD_ILS/0/SD_ILS:599047
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Realizing the Metaverse : a communications and networking perspective
ent://SD_ILS/0/SD_ILS:599057
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Lim, Wei Yang Bryan, editor. Xiong, Zehui, editor. Niyato, Dusit, editor. Zhang, Junshan (Electrical engineer), editor. Shen, X. (Xuemin), 1958- editor.<br/>Preferred Shelf Number TK5105.8864 .R43 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188932</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The DevSecOps playbook : deliver continuous security at speed
ent://SD_ILS/0/SD_ILS:598634
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart edge computing : an operation research perspective
ent://SD_ILS/0/SD_ILS:598978
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Chakraborty, Rajdeep, editor. Ghosh, Anupam, editor. Mandal, Jyotsna Kumar, editor. Choudhury, Tanupriya, editor. Chatterjee, Prasenjit, editor.<br/>Preferred Shelf Number QA76.583<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fog computing for intelligent cloud IoT systems
ent://SD_ILS/0/SD_ILS:599191
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Banerjee, Chandan, editor. Ghosh, Anupam, editor. Chakraborty, Rajdeep, editor. Elngar, Ahmed A., editor.<br/>Preferred Shelf Number TK5105.8857 .F64 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394175345</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical cyber intelligence : a hands-on guide to digital forensics
ent://SD_ILS/0/SD_ILS:599262
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number HV8079 .C65 J633 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integrating metaheuristics in computer vision for real-world optimization problems
ent://SD_ILS/0/SD_ILS:599305
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Preferred Shelf Number TA1637 .I58 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230952">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394230952</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing in cybersecurity
ent://SD_ILS/0/SD_ILS:598685
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine intelligence, big data analytics, and IoT in image processing : practical applications
ent://SD_ILS/0/SD_ILS:598220
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Preferred Shelf Number Q325.5 .M33 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolving networking technologies : developments and future directions
ent://SD_ILS/0/SD_ILS:598339
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Gupta, Shaurya, editor.<br/>Preferred Shelf Number TK5105.5 .E96 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data exfiltration threats and prevention techniques : machine learning and memory-based data security
ent://SD_ILS/0/SD_ILS:598245
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Tari, Zahir, 1961- author. Sohrabi, Nasrin, 1982- author. Samadi, Yasaman, 1993- author. Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number TK5105.59 .T365 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework
ent://SD_ILS/0/SD_ILS:597029
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Brumfield, Cynthia, author. Haugli, Brian, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 B82 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119816348">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119816348</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The CISO evolution : business knowledge for cybersecurity executives
ent://SD_ILS/0/SD_ILS:597056
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Sharp, Matthew K., author. Lambros, Kyriakos P., author.<br/>Preferred Shelf Number HD30.2 .S5325 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding artificial intelligence : fundamentals and applications
ent://SD_ILS/0/SD_ILS:597672
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Liu, Albert Chun-Chen, author. Law, Oscar Ming Kin, author. Law, Iain, author.<br/>Preferred Shelf Number Q335 .L58 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and local government
ent://SD_ILS/0/SD_ILS:597392
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Norris, Donald F., author. Mateczun, Laura, author. Forno, Richard, author.<br/>Preferred Shelf Number JS331 .N67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in smart homes : architectures, solutions and technologies
ent://SD_ILS/0/SD_ILS:597626
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Executive's guide to cyber risk : securing the future today
ent://SD_ILS/0/SD_ILS:597567
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Moyo, Siegfried, author.<br/>Preferred Shelf Number HF5548.37 .M68 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts
ent://SD_ILS/0/SD_ILS:597703
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Poston, Howard E., III, author.<br/>Preferred Shelf Number QA76.9 .B56 P67 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust-based communication systems for internet of things applications
ent://SD_ILS/0/SD_ILS:597744
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tools, languages, methodologies for representing semantics on the web of things
ent://SD_ILS/0/SD_ILS:597905
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Mehta, Shikha, editor.<br/>Preferred Shelf Number TK1505.88815<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394171460">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394171460</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in vehicular networks : focus on location and identity privacy
ent://SD_ILS/0/SD_ILS:597917
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Benarous, Leila. Bitam, Salim. Mellouk, Abdelhamid.<br/>Preferred Shelf Number TE228.37<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394172610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game theory and machine learning for cyber security
ent://SD_ILS/0/SD_ILS:597035
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Kamhoua, Charles A., editor. Kiekintveld, Christopher D., editor. Fang, Fei, 1989- editor. Zhu, Quanyan, editor.<br/>Preferred Shelf Number TK5105.59 .G353 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Conflicts, crimes and regulations in cyberspace
ent://SD_ILS/0/SD_ILS:597281
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Laurent, Sébastien, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119885092</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Unmanned aerial vehicles for Internet of Things (IoT) : concepts, techniques, and applications
ent://SD_ILS/0/SD_ILS:596898
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Mohindru, Vandana, editor. Singh, Yashwant, editor. Bhatt, Ravindara, editor. Gupta, Anuj Kumar, editor.<br/>Preferred Shelf Number TL589.4 .U55 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119769170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and decision makers : data security and digital trust
ent://SD_ILS/0/SD_ILS:595943
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:595887
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C37 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Women of color in tech : a blueprint for inspiring and mentoring the next generation of technology innovators
ent://SD_ILS/0/SD_ILS:595893
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Tedrick, Susanne.<br/>Preferred Shelf Number T36<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119633532">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119633532</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber breach response that actually works : organizational approach to managing residual risk
ent://SD_ILS/0/SD_ILS:596117
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Gorecki, Andrew.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity
ent://SD_ILS/0/SD_ILS:596276
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Design and analysis of security protocol for communication
ent://SD_ILS/0/SD_ILS:595798
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Goyal, Dinesh, 1976- editor. Balamurigan, A., editor. Peng, Sheng-Lung, editor. Verma, O. P. (Telecommunications engineer), editor.<br/>Preferred Shelf Number TK5105.59 .D468 2020 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking connected cars : tactics, techniques, and procedures
ent://SD_ILS/0/SD_ILS:595843
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Knight, Alissa, author.<br/>Preferred Shelf Number TL152.8 .K65 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security engineering : a guide to building dependable distributed systems
ent://SD_ILS/0/SD_ILS:596480
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine learning and cognitive science applications in cyber security
ent://SD_ILS/0/SD_ILS:482151
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
ent://SD_ILS/0/SD_ILS:595099
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Mishra, Brojo Kishore, 1979- editor. Khari, Manju, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Electrical Engineering Handbook - Six Volume Set
ent://SD_ILS/0/SD_ILS:542484
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Dorf, Richard C., editor. Taylor and Francis.<br/>Preferred Shelf Number R857 .B54<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420049756">Click here to view.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social-behavioral modeling for complex systems
ent://SD_ILS/0/SD_ILS:594823
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Davis, Paul K., 1943- editor. O'Mahony, Angela, editor. Pfautz, Jonathan, editor.<br/>Preferred Shelf Number HA29 .S6736 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119485001">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119485001</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, privacy and digital forensics in the cloud
ent://SD_ILS/0/SD_ILS:594934
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Chen, Lei, 1978 July 28- editor. Takabi, Hassan, 1982- editor. Le-Khac, Nhien-An, 1972- editor.<br/>Preferred Shelf Number QA76.585 .S43 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
ent://SD_ILS/0/SD_ILS:595279
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:595304
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CompTIA PenTest+ Practice Test : Exam PT0-001
ent://SD_ILS/0/SD_ILS:595329
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Panek, Crystal, author. Tracy, Robb.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119575931</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
ent://SD_ILS/0/SD_ILS:595415
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tribe of hackers : cybersecurity advice from the best hackers in the world
ent://SD_ILS/0/SD_ILS:595418
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
We have root : even more advice from Schneier on security
ent://SD_ILS/0/SD_ILS:595432
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
ent://SD_ILS/0/SD_ILS:595435
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity program development for business : the essential planning guide
ent://SD_ILS/0/SD_ILS:594455
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CCNA security study guide : exam 210-260
ent://SD_ILS/0/SD_ILS:594192
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author McMillan, Troy, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing and virtualization
ent://SD_ILS/0/SD_ILS:594386
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Le, Dac-Nhuong, 1983- editor. Kumar, Raghvendra, 1987- editor. Nguyen, Nhu Gia, editor. Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number QA76.9 .V5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows security monitoring : scenarios and patterns
ent://SD_ILS/0/SD_ILS:594404
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Miroshnikov, Andrei, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An introduction to cyber modeling and simulation
ent://SD_ILS/0/SD_ILS:594699
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420842</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced penetration testing : hacking the world's most secure networks
ent://SD_ILS/0/SD_ILS:593439
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Allsopp, Wil, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows 10 Anniversary update bible
ent://SD_ILS/0/SD_ILS:593543
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Tidrow, Rob, author. Boyce, Jim, 1958- author. Shapiro, Jeffrey R., author.<br/>Preferred Shelf Number QA76.76 .O63<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119416999">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119416999</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
ent://SD_ILS/0/SD_ILS:593609
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Antonucci, Domenic, author.<br/>Preferred Shelf Number HV6773 .A58 2017<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking the hacker : learn from the experts who take down hackers
ent://SD_ILS/0/SD_ILS:593636
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Messier, Ric, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer vision and imaging in intelligent transportation systems
ent://SD_ILS/0/SD_ILS:593561
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Loce, Robert P., editor. Bala, Raja, editor. Trivedi, Mohan M., editor.<br/>Preferred Shelf Number TE228.3<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118971666">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118971666</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Real-time embedded systems
ent://SD_ILS/0/SD_ILS:593770
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Wang, Jiacun, 1963- author.<br/>Preferred Shelf Number TK7895 .E42<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420712">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119420712</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud management and security
ent://SD_ILS/0/SD_ILS:341816
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Abbadi, Imad M., author.<br/>Preferred Shelf Number ONLINE(341816.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Business continuity and disaster recovery planning for IT professionals
ent://SD_ILS/0/SD_ILS:306695
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity for executives : a practical guide
ent://SD_ILS/0/SD_ILS:341997
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Federated identity primer
ent://SD_ILS/0/SD_ILS:306461
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Rountree, Derrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reliability and availability of cloud computing
ent://SD_ILS/0/SD_ILS:249383
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Bauer, Eric. Adams, Randee. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:298878
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:303838
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SIP security
ent://SD_ILS/0/SD_ILS:297791
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security governance a practical development and implementation approach
ent://SD_ILS/0/SD_ILS:297743
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:306503
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security current status and future directions
ent://SD_ILS/0/SD_ILS:249506
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Douligeris, C. (Christos)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
ent://SD_ILS/0/SD_ILS:306469
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Maynor, David. Mookhey, K. K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:540065
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Krause, Micki. Tipton, Harold F.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439833032">Click here to view.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical infrastructure protection in homeland security defending a networked nation
ent://SD_ILS/0/SD_ILS:303065
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Lewis, T. G. (Theodore Gyle), 1941-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQL
ent://SD_ILS/0/SD_ILS:253863
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author XYPRO Technology Corporation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Combating spyware in the enterprise
ent://SD_ILS/0/SD_ILS:254075
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Baskin, Brian. Piltzecker, Tony, 1975-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:301803
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Amini, Rob. Hunter, Laura E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider threat protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:253661
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Cole, Eric. Ring, Sandra.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical VoIP security
ent://SD_ILS/0/SD_ILS:253669
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Porter, Thomas.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber spying tracking your family's (sometimes) secret online lives
ent://SD_ILS/0/SD_ILS:253673
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stealing the network how to own an identity
ent://SD_ILS/0/SD_ILS:253663
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software piracy exposed
ent://SD_ILS/0/SD_ILS:253664
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Aggressive network self-defense
ent://SD_ILS/0/SD_ILS:253672
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Wyler, Neil R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
InfoSec career hacking sell your skillz, not your soul
ent://SD_ILS/0/SD_ILS:253681
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and ethics social and organizational issues
ent://SD_ILS/0/SD_ILS:152966
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Quigley, Marian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computers, Software Engineering, and Digital Devices
ent://SD_ILS/0/SD_ILS:542493
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Dorf, Richard C., author. Taylor and Francis.<br/>Preferred Shelf Number TK7885<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420037050">Click here to view.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security sage's guide to hardening the network infrastructure
ent://SD_ILS/0/SD_ILS:253636
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Andrés, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">http://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing and securing a Cisco structured wireless-aware network
ent://SD_ILS/0/SD_ILS:253637
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Wall, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">http://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Beale, Jay. Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity operations handbook
ent://SD_ILS/0/SD_ILS:253847
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Rittinghouse, John W. Hancock, Bill, 1957-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Cisco network security
ent://SD_ILS/0/SD_ILS:253616
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Knipp, Eric. Danielyan, Edgar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">http://www.sciencedirect.com/science/book/9781931836562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hack proofing your network
ent://SD_ILS/0/SD_ILS:253618
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Ahmad, David R. Mirza. Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Scene of the cybercrime computer forensics handbook
ent://SD_ILS/0/SD_ILS:253615
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Shinder, Debra Littlejohn. Tittel, Ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for telecommunications network management
ent://SD_ILS/0/SD_ILS:249697
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Rozenblit, Moshe, 1944-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2026-01-31T06:26:48Z
2026-01-31T06:26:48Z
Author Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>