Search Results for Computer networks -- Security measures.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0025C2$0025A0$0026ic$003dtrue$0026ps$003d300?
2025-12-12T22:16:54Z
Hacking Interface
ent://SD_ILS/0/SD_ILS:524308
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2024<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ağ ve yazılım güvenliği
ent://SD_ILS/0/SD_ILS:524301
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Çontar, Furkan.<br/>Preferred Shelf Number TK5105.59 C66 2023<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cyber Technologies and Emerging Sciences ICCTES 2021
ent://SD_ILS/0/SD_ILS:526691
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Maurya, Sudhanshu. editor. Peddoju, Sateesh K. editor. Ahmad, Badlishah. editor. Chihi, Ines. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2538-2">https://doi.org/10.1007/978-981-19-2538-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2022
ent://SD_ILS/0/SD_ILS:526883
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Ranganathan, G. editor. Fernando, Xavier. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and Identity Access Management
ent://SD_ILS/0/SD_ILS:527374
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Rawal, Bharat S. author. Manogaran, Gunasekaran. author. Peter, Alexender. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Trends in Intelligent Systems & Network Security
ent://SD_ILS/0/SD_ILS:527281
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Ben Ahmed, Mohamed. editor. Abdelhakim, Boudhir Anouar. editor. (orcid)0000-0003-4036-9956 Ane, Bernadetta Kwintiana. editor. Rosiyadi, Didi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-15191-0">https://doi.org/10.1007/978-3-031-15191-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems ICCCES 2022
ent://SD_ILS/0/SD_ILS:527539
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bindhu, V. editor. Tavares, João Manuel R. S. editor. Vuppalapati, Chandrasekar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7753-4">https://doi.org/10.1007/978-981-19-7753-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Computing and Sustainable Informatics Proceedings of ICMCSI 2023
ent://SD_ILS/0/SD_ILS:527730
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Shakya, Subarna. editor. Papakostas, George. editor. Kamel, Khaled A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0835-6">https://doi.org/10.1007/978-981-99-0835-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Communication Technology and Computing Proceedings of AICTC 2022
ent://SD_ILS/0/SD_ILS:527740
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Goar, Vishal. editor. Kuri, Manoj. editor. Kumar, Rajesh. editor. Senjyu, Tomonobu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9888-1">https://doi.org/10.1007/978-981-19-9888-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security IC4S 2022
ent://SD_ILS/0/SD_ILS:528006
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Tanwar, Sudeep. editor. Wierzchon, Slawomir T. editor. Singh, Pradeep Kumar. editor. Ganzha, Maria. editor. Epiphaniou, Gregory. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1479-1">https://doi.org/10.1007/978-981-99-1479-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next Generation Systems and Networks Proceedings of BITS EEE CON 2022
ent://SD_ILS/0/SD_ILS:528044
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bansal, Hari Om. editor. Ajmera, Pawan K. editor. Joshi, Sandeep. editor. Bansal, Ramesh C. editor. (orcid)0000-0002-1725-2648 Shekhar, Chandra. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0483-9">https://doi.org/10.1007/978-981-99-0483-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Third International Conference on Computing, Communications, and Cyber-Security IC4S 2021
ent://SD_ILS/0/SD_ILS:528473
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Singh, Pradeep Kumar. editor. Wierzchoń, Sławomir T. editor. Tanwar, Sudeep. editor. Rodrigues, Joel J. P. C. editor. Ganzha, Maria. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-1142-2">https://doi.org/10.1007/978-981-19-1142-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the 6th International Conference on Advance Computing and Intelligent Engineering ICACIE 2021
ent://SD_ILS/0/SD_ILS:528875
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Pati, Bibudhendu. editor. Panigrahi, Chhabi Rani. editor. Mohapatra, Prasant. editor. Li, Kuan-Ching. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2225-1">https://doi.org/10.1007/978-981-19-2225-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Pattern Recognition Proceedings of CIPR 2023
ent://SD_ILS/0/SD_ILS:527264
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Das, Asit Kumar. editor. Nayak, Janmenjoy. editor. Naik, Bighnaraj. editor. Vimal, S. editor. Pelusi, Danilo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3734-9">https://doi.org/10.1007/978-981-99-3734-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Computing and Applications Proceedings of ICDIC 2020
ent://SD_ILS/0/SD_ILS:528678
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Rao, B. Narendra Kumar. editor. Balasubramanian, R. editor. Wang, Shiuh-Jeng. editor. Nayak, Richi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Communication Technologies and Virtual Mobile Networks Proceedings of ICICV 2022
ent://SD_ILS/0/SD_ILS:528870
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Rajakumar, G. editor. Du, Ke-Lin. editor. Vuppalapati, Chandrasekar. editor. Beligiannis, Grigorios N. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-1844-5">https://doi.org/10.1007/978-981-19-1844-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI Embedded Assurance for Cyber Systems
ent://SD_ILS/0/SD_ILS:528935
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wang, Cliff. editor. Iyengar, S.S. editor. Sun, Kun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-42637-7">https://doi.org/10.1007/978-3-031-42637-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolution in Computational Intelligence Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2022)
ent://SD_ILS/0/SD_ILS:529006
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bhateja, Vikrant. editor. Yang, Xin-She. editor. Lin, Jerry Chun-Wei. editor. Das, Ranjita. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7513-4">https://doi.org/10.1007/978-981-19-7513-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1
ent://SD_ILS/0/SD_ILS:529010
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Singh, Yashwant. editor. Singh, Pradeep Kumar. editor. Kolekar, Maheshkumar H. editor. Kar, Arpan Kumar. editor. Gonçalves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2023
ent://SD_ILS/0/SD_ILS:529021
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Ranganathan, G. editor. EL Allioui, Youssouf. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
ent://SD_ILS/0/SD_ILS:529055
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Schiffner, Stefan. editor. Ziegler, Sébastien. editor. (orcid)0000-0001-7255-4975 Jensen, Meiko. editor. (orcid)0009-0003-2397-9813 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology NICE-DT 2023
ent://SD_ILS/0/SD_ILS:527944
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Singh, Sri Niwas. editor. Mahanta, Saurov. editor. Singh, Yumnam Jayanta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1699-3">https://doi.org/10.1007/978-981-99-1699-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023
ent://SD_ILS/0/SD_ILS:528415
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Giri, Debasis. editor. Gollmann, Dieter. editor. Ponnusamy, S. editor. Kouichi, Sakurai. editor. Stanimirović, Predrag S. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolution in Computational Intelligence Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023)
ent://SD_ILS/0/SD_ILS:528820
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bhateja, Vikrant. editor. Yang, Xin-She. editor. Ferreira, Marta Campos. editor. (orcid)0000-0001-9505-5730 Sengar, Sandeep Singh. editor. Travieso-Gonzalez, Carlos M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-6702-5">https://doi.org/10.1007/978-981-99-6702-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kendi siteni kendin koru
ent://SD_ILS/0/SD_ILS:524306
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Büyükgöze, Selma. El, Çağrı.<br/>Preferred Shelf Number TK5105.59 B898 2022<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Elektronik harp
ent://SD_ILS/0/SD_ILS:514348
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Pakfiliz, Ahmet Güngör.<br/>Preferred Shelf Number UG485 P35 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ağ yönetimi ve bilgi güvenliği
ent://SD_ILS/0/SD_ILS:516275
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bilge, Alper. Kaçmaz, Emre.<br/>Preferred Shelf Number TK5105.59 A98 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Çeliktaş, Barış .<br/>Preferred Shelf Number UG485 C45 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59.A39 U94 2020<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Siber güvenlik ve savunma : standartlar ve uygulamalar
ent://SD_ILS/0/SD_ILS:462283
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Sağıroğlu, Şeref.<br/>Preferred Shelf Number TK5105.59 S53 2019<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Countering cyber attacks and preserving the integrity and availability of critical systems
ent://SD_ILS/0/SD_ILS:482177
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483112
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Nandi, Sukumar. editor. Jinwala, Devesh. editor. Singh, Virendra. editor. Laxmi, Vijay. editor. Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484846
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bassioni, Ghada. editor. Kebe, Cheikh M.F. editor. Gueye, Assane. editor. (orcid)0000-0001-6469-4716 Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484847
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Askarov, Aslan. editor. Hansen, René Rydhof. editor. Rafnsson, Willard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime
ent://SD_ILS/0/SD_ILS:483013
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483366
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483889
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Meng, Weizhi. editor. (orcid)0000-0003-4384-5786 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberdanger Understanding and Guarding Against Cybercrime
ent://SD_ILS/0/SD_ILS:485936
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and security challenges in emerging networks
ent://SD_ILS/0/SD_ILS:481975
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity education for awareness and compliance
ent://SD_ILS/0/SD_ILS:482092
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Vasileiou, Ismini, 1980- editor. Furnell, Steven, 1970- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400107
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400186
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Chowdhury, Kaushik Roy. editor. Di Felice, Marco. editor. Matta, Ibrahim. editor. Sheng, Bo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400306
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Budaghyan, Lilya. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number QA76.9.A25 A59 2018<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:459114
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Faircloth, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safety of web applications : risks, encryption and handling vulnerabilities with PHP
ent://SD_ILS/0/SD_ILS:459467
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Quinton, Éric, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:459518
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in network functions virtualization
ent://SD_ILS/0/SD_ILS:459901
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Zhang, Zonghua, author. Meddahi, Ahmed, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of cyber safety : computer and mobile device safety made easy
ent://SD_ILS/0/SD_ILS:459044
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Sammons, John, author. Cross, Michael, 1965- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the internet of things
ent://SD_ILS/0/SD_ILS:459335
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:543286
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author PELTIER, THOMAS R.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429210747">https://www.taylorfrancis.com/books/9780429210747</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Service Oriented Architectures.
ent://SD_ILS/0/SD_ILS:542633
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Williams, Walter, author. CRC Press LLC.<br/>Preferred Shelf Number TK5105.5828 .W55 2017<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
ent://SD_ILS/0/SD_ILS:542757
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author VARSALONE, JESSE.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security awareness for CEOs and management
ent://SD_ILS/0/SD_ILS:458665
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:458777
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network performance and security : testing and analyzing using open source and low-cost tools
ent://SD_ILS/0/SD_ILS:458789
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Chapman, Chris, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for penetration testers : building better tools
ent://SD_ILS/0/SD_ILS:459217
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Andress, Jason, author. Linn, Ryan, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data breach preparation and response : breaches are certain, impact is not
ent://SD_ILS/0/SD_ILS:458926
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Fowler, Kevvie, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security : defending the domain name system
ent://SD_ILS/0/SD_ILS:458935
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Liska, Allan, author. Stowe, Geoffrey, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber guerilla
ent://SD_ILS/0/SD_ILS:458953
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh Hour CISSP®
ent://SD_ILS/0/SD_ILS:459073
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Conrad, Eric, author. Seth Misenar, author. Joshua Feldman, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:513452
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
ent://SD_ILS/0/SD_ILS:458699
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Richter, Andy, author. Wood, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ağ ve yazılım güvenliği
ent://SD_ILS/0/SD_ILS:379758
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Çontar, Furkan.<br/>Preferred Shelf Number TK5105.59 C66 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber istihbarat
ent://SD_ILS/0/SD_ILS:384051
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Keleştemur, Atalay<br/>Preferred Shelf Number QA76.9.A25 K45 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Managing online risk : apps, mobile, and social media security
ent://SD_ILS/0/SD_ILS:355514
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355514.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dissecting the hack : the v3rb0ten network
ent://SD_ILS/0/SD_ILS:458624
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tam kapsamlı sanal test laboratuvarı kurulumu ve uygulamalı sızma testleri
ent://SD_ILS/0/SD_ILS:513467
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Yalçınkaya, Mehmet Ali, yazar. Küçüksille, Ecir Uğur, yazar.<br/>Preferred Shelf Number TK5105.59 Y35 2015<br/>Format: Regular print<br/>Availability Beytepe Library~1<br/>
PCI compliance : understand and implement effective PCI data security standard compliance
ent://SD_ILS/0/SD_ILS:355363
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Williams, Branden R., author. Chuvakin, Anton A., author. Milroy, Derek, editor<br/>Preferred Shelf Number ONLINE(355363.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Case studies in secure computing : achievements and trends
ent://SD_ILS/0/SD_ILS:541687
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Issac, Biju, editor. Israr, Nauman, editor.<br/>Preferred Shelf Number QA76.9 .A25 C426 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482207071">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:306690
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing information security
ent://SD_ILS/0/SD_ILS:306692
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Business continuity and disaster recovery planning for IT professionals
ent://SD_ILS/0/SD_ILS:306695
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cybersecurity for executives : a practical guide
ent://SD_ILS/0/SD_ILS:341997
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
ent://SD_ILS/0/SD_ILS:355853
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security
ent://SD_ILS/0/SD_ILS:342168
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data analysis for network cyber-security
ent://SD_ILS/0/SD_ILS:354757
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:355909
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security careers skills, compensation, and career paths
ent://SD_ILS/0/SD_ILS:356043
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of digital privacy simple tools to protect your personal information and your identity online
ent://SD_ILS/0/SD_ILS:356123
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cherry, Denny. LaRock, Thomas.<br/>Preferred Shelf Number ONLINE(356123.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:317847
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Distributed networks : intelligence, security, and applications
ent://SD_ILS/0/SD_ILS:540452
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Memon, Qurban Ali, editor.<br/>Preferred Shelf Number QA76.9 .D5 D55626 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315216218">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Conducting network penetration and espionage in a global environment
ent://SD_ILS/0/SD_ILS:541163
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Middleton, Bruce, 1953, author.<br/>Preferred Shelf Number TK5105.59 .M53 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482206487">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Anonymous communication networks : protecting privacy on the web
ent://SD_ILS/0/SD_ILS:543619
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Peng, Kun, author.<br/>Preferred Shelf Number TK5105.59 .P463 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881606">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:543676
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cybercrime and cyberwarfare
ent://SD_ILS/0/SD_ILS:341980
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:355770
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security for multihop wireless networks
ent://SD_ILS/0/SD_ILS:538652
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Khan, Shafiullah, editor. Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number TK5105.59 .S43 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466578043">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Network anomaly detection : a machine learning perspective
ent://SD_ILS/0/SD_ILS:547748
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bhattacharyya, Dhruba K., author. Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number TK5105.59 .B474 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466582095">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information protection playbook
ent://SD_ILS/0/SD_ILS:306649
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of web hacking tools and techniques to attack the Web
ent://SD_ILS/0/SD_ILS:306699
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
FISMA and the risk management framework the new practice of federal cyber security
ent://SD_ILS/0/SD_ILS:145936
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Gantz, Stephen D. Philpott, Daniel R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
UTM security with Fortinet Mastering FortiOS
ent://SD_ILS/0/SD_ILS:146934
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Tam, Kenneth.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied network security monitoring collection, detection, and analysis
ent://SD_ILS/0/SD_ILS:356122
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Sanders, Chris. Smith, Jason.<br/>Preferred Shelf Number ONLINE(356122.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes
ent://SD_ILS/0/SD_ILS:313044
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Fadyushin, Vyacheslav.<br/>Preferred Shelf Number ONLINE(313044.1)<br/>Electronic Access Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in cyber security technology, operations, and experiences
ent://SD_ILS/0/SD_ILS:239591
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automatic defense against zero-day polymorphic worms in communication networks
ent://SD_ILS/0/SD_ILS:539715
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Mohammed, Mohssen, 1982, author. Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number QA76.76 .C68 M64 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466557284">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Official (ISC)[superscript 2] guide to the CAP CBK
ent://SD_ILS/0/SD_ILS:540750
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Howard, Patrick D., author.<br/>Preferred Shelf Number TK5105.59 .H673 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439820766">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Iris biometric model for secured network access
ent://SD_ILS/0/SD_ILS:546623
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Khoury, Franjieh El., author.<br/>Preferred Shelf Number TK7882 .B56 K46 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502147">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:547855
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number TK5105.59 .H3532 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security for managers
ent://SD_ILS/0/SD_ILS:516570
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Responsive Security
ent://SD_ILS/0/SD_ILS:542438
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Kang, Meng-Chow, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:276700
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Robust control system networks how to achieve reliable control after Stuxnet
ent://SD_ILS/0/SD_ILS:280181
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Langner, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Operating systems demystified
ent://SD_ILS/0/SD_ILS:294101
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security metrics a beginner's guide
ent://SD_ILS/0/SD_ILS:293238
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the clicks network security in the age of social media
ent://SD_ILS/0/SD_ILS:293240
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle WebLogic server 11g administration handbook
ent://SD_ILS/0/SD_ILS:293243
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Alapati, Sam R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
ent://SD_ILS/0/SD_ILS:145254
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook on securing cyber-physical critical infrastructure
ent://SD_ILS/0/SD_ILS:145579
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
ent://SD_ILS/0/SD_ILS:145689
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
ent://SD_ILS/0/SD_ILS:146274
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance
ent://SD_ILS/0/SD_ILS:148429
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Chuvakin, Anton. Williams, Branden R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent threat understanding the danger and how to protect your organization
ent://SD_ILS/0/SD_ILS:146056
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148516
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CISSP study guide
ent://SD_ILS/0/SD_ILS:148769
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Client-side attacks and defense
ent://SD_ILS/0/SD_ILS:148731
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Oriyano, Sean-Philip. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:241837
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and application security fundamentals and practices
ent://SD_ILS/0/SD_ILS:541627
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Ganguly, Debashis., author. Lahiri, Shibamouli.<br/>Preferred Shelf Number TK5105.59 .G36 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits
ent://SD_ILS/0/SD_ILS:545161
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T56 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439880289">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Data mining tools for malware detection
ent://SD_ILS/0/SD_ILS:545796
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Masud, Mehedy., author. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Preferred Shelf Number QA76.9 .D343 M385 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Asset protection through security awareness
ent://SD_ILS/0/SD_ILS:546687
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Speed, Tyler Justin., author.<br/>Preferred Shelf Number TK5105.59 .S643 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439809839">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cybersecurity : public sector threats and responses
ent://SD_ILS/0/SD_ILS:545406
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Andreasson, Kim J.<br/>Preferred Shelf Number TK5105.59 .C927 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439846643">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Readings and cases in information security : law and ethics
ent://SD_ILS/0/SD_ILS:267743
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Whitman, Michael E. Mattord, Herbert J.<br/>Preferred Shelf Number TK5105.878 W54 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing an IAM framework with Oracle identity and access management suite
ent://SD_ILS/0/SD_ILS:293289
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac OS X system administration
ent://SD_ILS/0/SD_ILS:293298
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile application security
ent://SD_ILS/0/SD_ILS:293312
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Networking a beginner's guide
ent://SD_ILS/0/SD_ILS:293314
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco ASA configuration
ent://SD_ILS/0/SD_ILS:293322
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Deal, Richard A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CNET do-it-yourself home networking projects 24 cool things you didn't know you could do!
ent://SD_ILS/0/SD_ILS:293687
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Aspinwall, Jim. CNET (Firm)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows server 2008 the complete reference
ent://SD_ILS/0/SD_ILS:293367
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Ruest, Danielle. Ruest, Nelson.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows server 2008 a beginner's guide
ent://SD_ILS/0/SD_ILS:293368
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Citrix Access Suite 4 advanced concepts the official guide
ent://SD_ILS/0/SD_ILS:293372
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Kaplan, Steve, 1955- Jones, Andy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Home networking demystified a self-teaching guide
ent://SD_ILS/0/SD_ILS:294143
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Long, Larry E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:303838
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:271446
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S782 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security firewalls and VPNs
ent://SD_ILS/0/SD_ILS:271452
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Stewart, James Michael.<br/>Preferred Shelf Number TK5105.59 S758 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Fedora 7 & Red Hat Enterprise Linux the complete reference
ent://SD_ILS/0/SD_ILS:293328
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Petersen, Richard, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wars of disruption and resilience cybered conflict, power, and national security
ent://SD_ILS/0/SD_ILS:244312
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ninja hacking unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:146263
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wilhelm, Thomas. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour CISSP study guide
ent://SD_ILS/0/SD_ILS:146597
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber warfare techniques, tactics and tools for security practitioners
ent://SD_ILS/0/SD_ILS:147479
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Andress, Jason. Winterfeld, Steve. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:148225
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Faircloth, Jeremy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for penetration testers building better tools
ent://SD_ILS/0/SD_ILS:148785
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Andress, Jason. Linn, Ryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the cloud cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:148980
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:386241
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Kahate, Atul.<br/>Preferred Shelf Number TK5105.59 K12 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Secure semantic service-oriented systems
ent://SD_ILS/0/SD_ILS:540399
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number TK5105.5828 .T48 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420073324">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Practical risk management for the CIO
ent://SD_ILS/0/SD_ILS:541595
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Scherling, Mark., author.<br/>Preferred Shelf Number HF5548.37 .S34 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T55 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the SSCP CBK
ent://SD_ILS/0/SD_ILS:543369
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number QA76.3 .O3845 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439804841">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security of self-organizing networks : MANET, WSN, WMN, VANET
ent://SD_ILS/0/SD_ILS:544711
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number TK5105.77 .S43 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439819203">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Liu, Lei, 1968, author.<br/>Preferred Shelf Number QA76.9 .A25 L587 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
China's cyberwarfare capability
ent://SD_ILS/0/SD_ILS:281481
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Marvel, Elisabette M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:306328
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour network+ exam N10-004 study guide
ent://SD_ILS/0/SD_ILS:146455
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Alpern, Naomi J. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance.
ent://SD_ILS/0/SD_ILS:148342
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Chuvakin, Anton. Williams, Branden R. Spangenberg, Ward.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Haines, Brad.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:149103
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest network attacks
ent://SD_ILS/0/SD_ILS:149185
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Prowell, Stacy J. Kraus, Rob. Borkin, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:148953
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security A Decision and Game-Theoretic Approach
ent://SD_ILS/0/SD_ILS:237887
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Alpcan, Tansu. Başar, Tamer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cognitive Radio Networking and Security A Game-Theoretic View
ent://SD_ILS/0/SD_ILS:238948
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Liu, K. J. Ray. Wang, Beibei.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of financial cryptography and security
ent://SD_ILS/0/SD_ILS:542098
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Rosenberg, Burton.<br/>Preferred Shelf Number HG1710 .H34 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
SIP security
ent://SD_ILS/0/SD_ILS:297791
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next generation SSH2 implementation securing data in motion
ent://SD_ILS/0/SD_ILS:146275
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
GFI network security and PCI compliance power tools
ent://SD_ILS/0/SD_ILS:148143
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Posey, Brien. Thompson, Troy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco router and switch forensics investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:148703
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:144722
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Disappearing cryptography information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:146450
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour security+ exam SYO-201 study guide
ent://SD_ILS/0/SD_ILS:146534
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SAP security configuration and deployment the IT administrator's guide to best practices
ent://SD_ILS/0/SD_ILS:148994
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wun-Young, Leslie. Hirao, Joey.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Talukder, Asoke K., author. Chaitanya, Manish.<br/>Preferred Shelf Number QA76.9 .A25 T34 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security software development : assessing and managing security risks
ent://SD_ILS/0/SD_ILS:543836
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Ashbaugh, Douglas A., author.<br/>Preferred Shelf Number QA76.9 .A25 A8246 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security in an IPv6 environment
ent://SD_ILS/0/SD_ILS:546853
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Minoli, Daniel, 1952, author. Kouns, Jake.<br/>Preferred Shelf Number TK5105.59 .M56 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420092301">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secure computer and network systems modeling, analysis and design
ent://SD_ILS/0/SD_ILS:296665
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Ye, Nong. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT futures delivering pervasive, real-time and secure services
ent://SD_ILS/0/SD_ILS:302768
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Warren, Paul (Paul W.) Davies, J. (N. John) Brown, David, 1954- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:297789
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integrating ISA Server 2006 with Microsoft Exchange 2007
ent://SD_ILS/0/SD_ILS:145628
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Strachan, Fergus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Netcat power tools
ent://SD_ILS/0/SD_ILS:146277
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Kanclirz, Jan. Baskin, Brian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:146369
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Varsalone, Jesse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security know it all
ent://SD_ILS/0/SD_ILS:146401
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Joshi, James B. D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical embedded security building secure resource-constrained systems
ent://SD_ILS/0/SD_ILS:147416
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Stapko, Timothy John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at securing Linux
ent://SD_ILS/0/SD_ILS:145540
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Krishnamurthy Madwachar, Mohan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Qian, Yi, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Nmap in the enterprise your guide to network scanning
ent://SD_ILS/0/SD_ILS:146442
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Orebaugh, Angela. Pinkard, Becky.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Google hacking for penetration testers. Volume 2
ent://SD_ILS/0/SD_ILS:148029
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:148333
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kismet hacking
ent://SD_ILS/0/SD_ILS:147861
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Haines, Brad. Schearer, Michael J. Thornton, Frank (Thorn)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Scene of the cybercrime
ent://SD_ILS/0/SD_ILS:148955
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Quality of Service in Ad Hoc Wireless Networks
ent://SD_ILS/0/SD_ILS:237801
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Mishra, Amitabh.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bacik, Sandy., author.<br/>Preferred Shelf Number QA76.9 .A25 B335 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information assurance architecture
ent://SD_ILS/0/SD_ILS:539830
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Willett, Keith D., author.<br/>Preferred Shelf Number QA76.9 .A25 W5487 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Digital privacy : theory, technologies, and practices
ent://SD_ILS/0/SD_ILS:547774
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Acquisti, Alessandro.<br/>Preferred Shelf Number QA76.9 .A25 D528 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052183">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security current status and future directions
ent://SD_ILS/0/SD_ILS:249506
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Douligeris, C. (Christos)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security of e-Systems and Computer Networks
ent://SD_ILS/0/SD_ILS:236023
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Obaidat, Mohammad. Boudriga, Noureddine.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511536700">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at Voip security
ent://SD_ILS/0/SD_ILS:145486
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Porter, Thomas, PhD. Gough, Michael, 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at configuring Open Source security tools
ent://SD_ILS/0/SD_ILS:145578
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:145654
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:147664
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance implementing effective PCI data security standards
ent://SD_ILS/0/SD_ILS:148195
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bradley, Tony, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort IDS and IPS toolkit
ent://SD_ILS/0/SD_ILS:148444
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Beale, Jay. Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">http://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AVIEN malware defense guide for the Enterprise
ent://SD_ILS/0/SD_ILS:145183
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Harley, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Asterisk hacking
ent://SD_ILS/0/SD_ILS:145355
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Brashars, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integrated security systems design concepts, specifications, and implementation
ent://SD_ILS/0/SD_ILS:145552
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Norman, Thomas L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnets the killer web app
ent://SD_ILS/0/SD_ILS:145283
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Schiller, Craig A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security assessment from vulnerability to patch
ent://SD_ILS/0/SD_ILS:146334
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Manzuik, Steve. Gold, André. Gatford, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimizing and testing WLANs proven techniques for maximum performance
ent://SD_ILS/0/SD_ILS:148270
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Alexander, Tom.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679862">http://www.sciencedirect.com/science/book/9780750679862</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Techno security's guide to e-discovery and digital forensics
ent://SD_ILS/0/SD_ILS:148564
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Techno Security's guide to managing risks for IT managers, auditors, and investigators
ent://SD_ILS/0/SD_ILS:148641
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Configuring Juniper Networks NetScreen & SSG firewalls
ent://SD_ILS/0/SD_ILS:148803
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cameron, Rob. Juniper Networks, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security+ study guide & DVD training system
ent://SD_ILS/0/SD_ILS:149089
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">http://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Techno Security's guide to managing risks for IT managers, auditors, and investigators
ent://SD_ILS/0/SD_ILS:112203
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wiles, Jack. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at configuring Open Source security tools
ent://SD_ILS/0/SD_ILS:112102
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at Voip security
ent://SD_ILS/0/SD_ILS:112106
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Porter, Thomas, PhD. Gough, Michael. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort IDS and IPS toolkit
ent://SD_ILS/0/SD_ILS:112112
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Beale, Jay Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : contemporary cases
ent://SD_ILS/0/SD_ILS:111021
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Wright, Marie A. Kakalik, John S.<br/>Preferred Shelf Number QA76.9.A25 W75 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security+ study guide & DVD training system
ent://SD_ILS/0/SD_ILS:112140
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cross, Michael, 1965- ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Configuring Juniper Networks NetScreen & SSG firewalls
ent://SD_ILS/0/SD_ILS:112154
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cameron, Rob. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integrated security systems design concepts, specifications, and implementation
ent://SD_ILS/0/SD_ILS:112175
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Norman, Thomas, CSC. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security assessment from vulnerability to patch
ent://SD_ILS/0/SD_ILS:112186
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Manzuik, Steve. Gold, André. Gatford, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance implementing effective PCI data security standards
ent://SD_ILS/0/SD_ILS:112189
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bradley, Tony, 1969- ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:306503
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the SSCP CBK
ent://SD_ILS/0/SD_ILS:540212
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Contesti, Diana-Lynn.<br/>Preferred Shelf Number TK5105.59 .O44 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203331576">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Mechanics of user identification and authentication : fundamentals of identity management
ent://SD_ILS/0/SD_ILS:539940
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Todorov, Dobromir., author.<br/>Preferred Shelf Number TK5105.59 .T575 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
802.1X port-based authentication
ent://SD_ILS/0/SD_ILS:544830
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Brown, Edwin Lyle., author.<br/>Preferred Shelf Number TK5105.59 .B765 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420044652">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Insider threat protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:253661
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Cole, Eric. Ring, Sandra.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical VoIP security
ent://SD_ILS/0/SD_ILS:253669
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Porter, Thomas.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Amini, Rob. Hunter, Laura E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:253676
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security log management identifying patterns in the chaos
ent://SD_ILS/0/SD_ILS:253947
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Babbin, Jacob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at configuring ISA server 2004
ent://SD_ILS/0/SD_ILS:253948
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Shinder, Thomas W. Shinder, Debra Littlejohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Syngress IT security project management handbook
ent://SD_ILS/0/SD_ILS:253949
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Snedaker, Susan. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Configuring SonicWALL firewalls
ent://SD_ILS/0/SD_ILS:253952
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bendell, Dan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical infrastructure protection in homeland security defending a networked nation
ent://SD_ILS/0/SD_ILS:303065
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Lewis, T. G. (Theodore Gyle), 1941-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Firewall policies and VPN configurations
ent://SD_ILS/0/SD_ILS:254076
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Henmi, Anne. Lucas, Mark. Singh, Abhishek. Cantrell, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490887">http://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at Windows System Administration using command line scripts
ent://SD_ILS/0/SD_ILS:145623
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing and building enterprise DMZs
ent://SD_ILS/0/SD_ILS:147464
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Dubrawsky, Ido. Baumrucker, C. Tate.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures
ent://SD_ILS/0/SD_ILS:146475
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Contos, Brian T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hack the stack using snort and ethereal to master the 8 layers of an insecure network
ent://SD_ILS/0/SD_ILS:147954
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Gregg, Michael (Michael C.) Watkins, Stephen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:148488
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Maynor, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG
ent://SD_ILS/0/SD_ILS:148969
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Seagren, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of information security
ent://SD_ILS/0/SD_ILS:108909
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bidgoli, Hossein, ed.<br/>Preferred Shelf Number TK5105.59 H35 2006 V.1<br/>Format: Books<br/>Availability Beytepe Library~3<br/>
Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG
ent://SD_ILS/0/SD_ILS:112197
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Seagren, Eric. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Syngress force emerging threat analysis from mischief to malicious
ent://SD_ILS/0/SD_ILS:112202
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Maynor, David. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
How to cheat at Windows System Administration using command line scripts
ent://SD_ILS/0/SD_ILS:112107
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing and building enterprise DMZs
ent://SD_ILS/0/SD_ILS:112159
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Dubrawsky, Ido. Baumrucker, C. Tate. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust and reputation for service-oriented environments technologies for building business intelligence and consumer confidence
ent://SD_ILS/0/SD_ILS:296679
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Chang, Elizabeth. Dillon, Tharam S., 1943- Hussain, Farookh K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www3.interscience.wiley.com/cgi-bin/homepage/?isbn=9780470028261">Find on the Web</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470028261">http://dx.doi.org/10.1002/9780470028261</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845">http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Audit and trace log management : consolidation and analysis
ent://SD_ILS/0/SD_ILS:542713
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Maier, Phillip Q., author.<br/>Preferred Shelf Number TK5105.59 .M34 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203491768">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Enhancing computer security with smart technology
ent://SD_ILS/0/SD_ILS:544823
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Vemuri, V. Rao.<br/>Preferred Shelf Number TK5105.59 .E62 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Error correcting coding and security for data networks analysis of the superchannel concept
ent://SD_ILS/0/SD_ILS:301147
2025-12-12T22:16:54Z
2025-12-12T22:16:54Z
Author Kabatiansky, G. Krouk, E. Semenov, S. John Wiley & Sons.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>