Search Results for Computer networks -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2026-01-11T22:30:28Z Behavioral insights in cybersecurity : a guide to digital human factors ent://SD_ILS/0/SD_ILS:567885 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sachs, Dustin S., author.<br/>Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed security monitoring and resilient cooperative control ent://SD_ILS/0/SD_ILS:567906 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Wen, Guanghui, 1983- author.&#160;Lv, Yuezu, 1991- author.&#160;Zhao, Dan, author.&#160;Lei, Xuqiang, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003669913">https://www.taylorfrancis.com/books/9781003669913</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent networks and systems : advanced technologies and applications ent://SD_ILS/0/SD_ILS:553413 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Siddique, N. H., editor.&#160;Arefin, Mohammad Shamsul, editor.&#160;Noori, Sheak Rashed Haider, editor.&#160;Kaiser, M. Shamim, editor.<br/>Preferred Shelf Number&#160;QA76.76 .E95<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032659770">https://www.taylorfrancis.com/books/9781032659770</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark essentials : simplifying network security and troubleshooting ent://SD_ILS/0/SD_ILS:580421 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Soni, Arun, author.<br/>Preferred Shelf Number&#160;TK5105.55<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003539261">https://www.taylorfrancis.com/books/9781003539261</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero-trust learning : applications in modern network security ent://SD_ILS/0/SD_ILS:580582 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kaushal, Chetna, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781779643575">https://www.taylorfrancis.com/books/9781779643575</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure detection and control in cyber-physical systems : working in the presence of malicious data ent://SD_ILS/0/SD_ILS:574476 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Yan, Jiaqi, author.&#160;Mo, Yilin, author.&#160;Wen, Changyun, 1963- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409199">https://www.taylorfrancis.com/books/9781003409199</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> NEW PERSPECTIVES IN BEHAVIORAL CYBERSECURITY II human behavior for. ent://SD_ILS/0/SD_ILS:560113 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003599142">https://www.taylorfrancis.com/books/9781003599142</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics in next generation internet for medical things : balancing security and sustainability ent://SD_ILS/0/SD_ILS:575627 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Saini, Hemant Kumar, editor&#160;Rani, Sita, editor&#160;Ouaissa, Mariya, editor&#160;Ouaissa, Mariyam, editor&#160;Abou El Houda, Zakaria, editor<br/>Preferred Shelf Number&#160;R859.7 .I59 D54 2026 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640325">https://www.taylorfrancis.com/books/9781003640325</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCE ent://SD_ILS/0/SD_ILS:553331 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Trim, Peter R. J., author.&#160;Lee, Yang-Im, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570905">https://www.taylorfrancis.com/books/9781003570905</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital education : security, readiness, and technology enhancement ent://SD_ILS/0/SD_ILS:560183 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Susanto, Heru, 1977- editor&#160;Leu, Fang-Yie, editor&#160;Bakr&#299;, Sa&#699;d &#699;Al&#299; al-&#7716;&#257;jj, editor&#160;Haghi, A. K., editor<br/>Preferred Shelf Number&#160;LB1028.57<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032670782">https://www.taylorfrancis.com/books/9781032670782</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The hack is back : techniques to beat hackers at their own games ent://SD_ILS/0/SD_ILS:558496 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Varsalone, Jesse, author.&#160;Haller, Christopher, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003033301">https://www.taylorfrancis.com/books/9781003033301</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:572623 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRIVACY IN VEHICULAR NETWORKS challenges and solutions. ent://SD_ILS/0/SD_ILS:552331 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Ma, Baihe.&#160;Wang, Xu.&#160;Ni, Wei.&#160;Liu, Ren Ping.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003518044">https://www.taylorfrancis.com/books/9781003518044</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures. Protecting health information ent://SD_ILS/0/SD_ILS:580393 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;R864<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527213">https://www.taylorfrancis.com/books/9781003527213</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : AI and governance ent://SD_ILS/0/SD_ILS:584311 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of AI-driven threat detection and prevention : a holistic approach ent://SD_ILS/0/SD_ILS:569783 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bhambri, Pankaj, editor.&#160;Anand A., Jose, 1975- editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003521020">https://www.taylorfrancis.com/books/9781003521020</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless ad-hoc and sensor networks : architecture, protocols, and applications ent://SD_ILS/0/SD_ILS:582337 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Singh, Pawan, editor.&#160;Kumar, Sudesh (Computer scientist), editor.&#160;Gupta, Sachin Kumar, editor.&#160;Rai, Abhay Kumar, editor.&#160;Saif, Abdu, editor.<br/>Preferred Shelf Number&#160;TK5105.77<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003528982">https://www.taylorfrancis.com/books/9781003528982</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Agile security in the digital era : challenges and cybersecurity trends ent://SD_ILS/0/SD_ILS:563898 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Zaydi, Mounia, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A414 2025<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478676">https://www.taylorfrancis.com/books/9781003478676</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Humans and cyber security : how organizations can enhance resilience through human factors ent://SD_ILS/0/SD_ILS:568695 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Widdowson, Amanda, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003427681">https://www.taylorfrancis.com/books/9781003427681</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimum spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:574605 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : third party risk management ent://SD_ILS/0/SD_ILS:584312 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing : a journey into the next frontier of information and communication security ent://SD_ILS/0/SD_ILS:589045 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Hammoudeh, Mohammad, editor.&#160;Essa, Abdullah T., editor.&#160;Sherbeeni, Amro M., editor.&#160;Firth, Clinton M., editor.&#160;Essa, Abdullah S. (Abdullah Saad) editor.<br/>Preferred Shelf Number&#160;QA76.889<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003475286">https://www.taylorfrancis.com/books/9781003475286</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ADVANCEMENTS IN CYBERSECURITY next-generation systems and. ent://SD_ILS/0/SD_ILS:589110 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003546153">https://www.taylorfrancis.com/books/9781003546153</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent approaches to cyber security ent://SD_ILS/0/SD_ILS:556106 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Shekokar, Narendra M., editor.&#160;Vasudevan, Hari, 1969- editor.&#160;Durbha, Surya Srinivas, editor.&#160;Michalas, Antonis, editor.&#160;Nagarhalli, Tatwadarshi P., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003408307">https://www.taylorfrancis.com/books/9781003408307</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ARTIFICIAL INTELLIGENCE AND IOT FOR CYBER SECURITY SOLUTIONS IN SMART CITIES ent://SD_ILS/0/SD_ILS:556161 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sharma, Smita.<br/>Preferred Shelf Number&#160;TD159.4<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003459835">https://www.taylorfrancis.com/books/9781003459835</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ZERO TRUST FRAMEWORK AND PRIVILEGED ACCESS MANAGEMENT (PAM) ent://SD_ILS/0/SD_ILS:555252 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470021">https://www.taylorfrancis.com/books/9781003470021</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New perspectives in behavioral cybersecurity : human behavior and decision-making models ent://SD_ILS/0/SD_ILS:564828 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Patterson, Wayne, 1945- editor.<br/>Preferred Shelf Number&#160;ZA3086.5 .C93<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003415060">https://www.taylorfrancis.com/books/9781003415060</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and business intelligence : innovations and machine learning for cyber risk management ent://SD_ILS/0/SD_ILS:553989 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Abedin, Mohammad Zoynul, editor.&#160;H&aacute;jek, Petr, editor.<br/>Preferred Shelf Number&#160;HD38.7<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003285854">https://www.taylorfrancis.com/books/9781003285854</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:524308 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2024<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Protecting information assets and IT infrastructure in the Cloud ent://SD_ILS/0/SD_ILS:554222 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;QA76.585 .D37 2024<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003459569">https://www.taylorfrancis.com/books/9781003459569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why CISOs fail ent://SD_ILS/0/SD_ILS:577207 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Engel, Barak, author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:586024 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The zero trust framework : threat hunting &amp; quantum mechanics ent://SD_ILS/0/SD_ILS:592723 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003392965">https://www.taylorfrancis.com/books/9781003392965</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems ICCCES 2022 ent://SD_ILS/0/SD_ILS:527539 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bindhu, V. editor.&#160;Tavares, Jo&atilde;o Manuel R. S. editor.&#160;Vuppalapati, Chandrasekar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-7753-4">https://doi.org/10.1007/978-981-19-7753-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing and Applications Proceedings of ICDIC 2020 ent://SD_ILS/0/SD_ILS:528678 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Rao, B. Narendra Kumar. editor.&#160;Balasubramanian, R. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Nayak, Richi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Communication Technologies and Virtual Mobile Networks Proceedings of ICICV 2022 ent://SD_ILS/0/SD_ILS:528870 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Rajakumar, G. editor.&#160;Du, Ke-Lin. editor.&#160;Vuppalapati, Chandrasekar. editor.&#160;Beligiannis, Grigorios N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-1844-5">https://doi.org/10.1007/978-981-19-1844-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the 6th International Conference on Advance Computing and Intelligent Engineering ICACIE 2021 ent://SD_ILS/0/SD_ILS:528875 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pati, Bibudhendu. editor.&#160;Panigrahi, Chhabi Rani. editor.&#160;Mohapatra, Prasant. editor.&#160;Li, Kuan-Ching. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2225-1">https://doi.org/10.1007/978-981-19-2225-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Evolution in Computational Intelligence Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2022) ent://SD_ILS/0/SD_ILS:529006 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bhateja, Vikrant. editor.&#160;Yang, Xin-She. editor.&#160;Lin, Jerry Chun-Wei. editor.&#160;Das, Ranjita. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-7513-4">https://doi.org/10.1007/978-981-19-7513-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1 ent://SD_ILS/0/SD_ILS:529010 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Singh, Yashwant. editor.&#160;Singh, Pradeep Kumar. editor.&#160;Kolekar, Maheshkumar H. editor.&#160;Kar, Arpan Kumar. editor.&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2023 ent://SD_ILS/0/SD_ILS:529021 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Ranganathan, G. editor.&#160;EL Allioui, Youssouf. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) ent://SD_ILS/0/SD_ILS:529055 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Schiffner, Stefan. editor.&#160;Ziegler, S&eacute;bastien. editor. (orcid)0000-0001-7255-4975&#160;Jensen, Meiko. editor. (orcid)0009-0003-2397-9813&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2022 ent://SD_ILS/0/SD_ILS:526883 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Ranganathan, G. editor.&#160;Fernando, Xavier. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Pattern Recognition Proceedings of CIPR 2023 ent://SD_ILS/0/SD_ILS:527264 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Das, Asit Kumar. editor.&#160;Nayak, Janmenjoy. editor.&#160;Naik, Bighnaraj. editor.&#160;Vimal, S. editor.&#160;Pelusi, Danilo. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3734-9">https://doi.org/10.1007/978-981-99-3734-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023 ent://SD_ILS/0/SD_ILS:528415 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Giri, Debasis. editor.&#160;Gollmann, Dieter. editor.&#160;Ponnusamy, S. editor.&#160;Kouichi, Sakurai. editor.&#160;Stanimirovi&#263;, Predrag S. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mind the tech gap : addressing the conflicts between IT and security teams ent://SD_ILS/0/SD_ILS:562665 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;T10.5<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264422">https://www.taylorfrancis.com/books/9781003264422</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning, blockchain, and cyber security in smart environments : applications and challenges ent://SD_ILS/0/SD_ILS:562630 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Tanwar, Sarvesh, editor.&#160;Badotra, Sumit, editor.&#160;Rana, Ajay, editor.<br/>Preferred Shelf Number&#160;TA347 .A78 M333 2023<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003240310">https://www.taylorfrancis.com/books/9781003240310</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI, machine learning and deep learning : a security perspective ent://SD_ILS/0/SD_ILS:555843 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Hu, Fei, 1972- editor.&#160;Hei, Xiali, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003187158">https://www.taylorfrancis.com/books/9781003187158</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ZERO-TRUST - AN INTRODUCTION ent://SD_ILS/0/SD_ILS:567805 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Madsen, Tom.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003464587">https://www.taylorfrancis.com/books/9781003464587</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic cyber security management ent://SD_ILS/0/SD_ILS:550021 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Trim, Peter R. J., author.&#160;Lee, Yang-Im, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003244295">https://www.taylorfrancis.com/books/9781003244295</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity ethics : an introduction ent://SD_ILS/0/SD_ILS:553941 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Manjikian, Mary, author.<br/>Preferred Shelf Number&#160;TK5105.878 .M36 2023<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003248828">https://www.taylorfrancis.com/books/9781003248828</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A&#287; ve yaz&#305;l&#305;m g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:524301 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;&Ccedil;ontar, Furkan.<br/>Preferred Shelf Number&#160;TK5105.59 C66 2023<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cyber Technologies and Emerging Sciences ICCTES 2021 ent://SD_ILS/0/SD_ILS:526691 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Maurya, Sudhanshu. editor.&#160;Peddoju, Sateesh K. editor.&#160;Ahmad, Badlishah. editor.&#160;Chihi, Ines. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2538-2">https://doi.org/10.1007/978-981-19-2538-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and Identity Access Management ent://SD_ILS/0/SD_ILS:527374 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Rawal, Bharat S. author.&#160;Manogaran, Gunasekaran. author.&#160;Peter, Alexender. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Intelligent Systems &amp; Network Security ent://SD_ILS/0/SD_ILS:527281 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Ben Ahmed, Mohamed. editor.&#160;Abdelhakim, Boudhir Anouar. editor. (orcid)0000-0003-4036-9956&#160;Ane, Bernadetta Kwintiana. editor.&#160;Rosiyadi, Didi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-15191-0">https://doi.org/10.1007/978-3-031-15191-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Computing and Sustainable Informatics Proceedings of ICMCSI 2023 ent://SD_ILS/0/SD_ILS:527730 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Shakya, Subarna. editor.&#160;Papakostas, George. editor.&#160;Kamel, Khaled A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-0835-6">https://doi.org/10.1007/978-981-99-0835-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Communication Technology and Computing Proceedings of AICTC 2022 ent://SD_ILS/0/SD_ILS:527740 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Goar, Vishal. editor.&#160;Kuri, Manoj. editor.&#160;Kumar, Rajesh. editor.&#160;Senjyu, Tomonobu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9888-1">https://doi.org/10.1007/978-981-19-9888-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology NICE-DT 2023 ent://SD_ILS/0/SD_ILS:527944 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Singh, Sri Niwas. editor.&#160;Mahanta, Saurov. editor.&#160;Singh, Yumnam Jayanta. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1699-3">https://doi.org/10.1007/978-981-99-1699-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security IC4S 2022 ent://SD_ILS/0/SD_ILS:528006 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Tanwar, Sudeep. editor.&#160;Wierzchon, Slawomir T. editor.&#160;Singh, Pradeep Kumar. editor.&#160;Ganzha, Maria. editor.&#160;Epiphaniou, Gregory. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1479-1">https://doi.org/10.1007/978-981-99-1479-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next Generation Systems and Networks Proceedings of BITS EEE CON 2022 ent://SD_ILS/0/SD_ILS:528044 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bansal, Hari Om. editor.&#160;Ajmera, Pawan K. editor.&#160;Joshi, Sandeep. editor.&#160;Bansal, Ramesh C. editor. (orcid)0000-0002-1725-2648&#160;Shekhar, Chandra. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-0483-9">https://doi.org/10.1007/978-981-99-0483-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Third International Conference on Computing, Communications, and Cyber-Security IC4S 2021 ent://SD_ILS/0/SD_ILS:528473 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Singh, Pradeep Kumar. editor.&#160;Wierzcho&#324;, S&#322;awomir T. editor.&#160;Tanwar, Sudeep. editor.&#160;Rodrigues, Joel J. P. C. editor.&#160;Ganzha, Maria. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-1142-2">https://doi.org/10.1007/978-981-19-1142-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Evolution in Computational Intelligence Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023) ent://SD_ILS/0/SD_ILS:528820 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bhateja, Vikrant. editor.&#160;Yang, Xin-She. editor.&#160;Ferreira, Marta Campos. editor. (orcid)0000-0001-9505-5730&#160;Sengar, Sandeep Singh. editor.&#160;Travieso-Gonzalez, Carlos M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-6702-5">https://doi.org/10.1007/978-981-99-6702-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI Embedded Assurance for Cyber Systems ent://SD_ILS/0/SD_ILS:528935 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Wang, Cliff. editor.&#160;Iyengar, S.S. editor.&#160;Sun, Kun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42637-7">https://doi.org/10.1007/978-3-031-42637-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deploying the Zero Trust Framework in MSFT Azure ent://SD_ILS/0/SD_ILS:563851 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Das, Ravindra, editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003442578">https://www.taylorfrancis.com/books/9781003442578</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security applications for industry 4.0 ent://SD_ILS/0/SD_ILS:564428 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sujatha, R., editor.&#160;Prakash, G., editor.&#160;Jhanjhi, Noor Zaman, 1972- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003203087">https://www.taylorfrancis.com/books/9781003203087</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A comprehensive guide to information security management and audit ent://SD_ILS/0/SD_ILS:581175 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Banoth, Rajkumar, author.&#160;Gugulothu, Narsimha, author.&#160;Godishala, Aruna Kranthi, author.<br/>Preferred Shelf Number&#160;HD38.7<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003322191">https://www.taylorfrancis.com/books/9781003322191</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced computer science applications : recent trends in AI, machine learning, and network security ent://SD_ILS/0/SD_ILS:583149 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Singh, Karan, 1981- editor.&#160;Banda, Latha, 1983- editor.&#160;Manjul, Manisha, 1982- editor.<br/>Preferred Shelf Number&#160;Q335 .A38 2023<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003369066">https://www.taylorfrancis.com/books/9781003369066</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:573236 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;DeFranco, Joanna F., author.&#160;Maley, Bob (Chief Security Officer), author.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2023 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003245223">https://www.taylorfrancis.com/books/9781003245223</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in cyber security and intelligent analytics ent://SD_ILS/0/SD_ILS:574219 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Verma, Abhishek, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003269144">https://www.taylorfrancis.com/books/9781003269144</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure data management for online learning applications ent://SD_ILS/0/SD_ILS:561768 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Deborah, L. Jegatha, editor.&#160;Vijayakumar, P., editor.&#160;Gupta, Brij, 1982- editor.&#160;Pelusi, Danilo, editor.<br/>Preferred Shelf Number&#160;LC5803 .C65<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264538">https://www.taylorfrancis.com/books/9781003264538</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security threats and challenges facing human life ent://SD_ILS/0/SD_ILS:589706 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Shekokar, Narendra M., editor.&#160;Vasudevan, Hari (Engineer), editor.&#160;Durbha, Surya Srinivas, editor.&#160;Michalas, Antonis, editor.&#160;Nagarhalli, Tatwadarshi P., editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003218555">https://www.taylorfrancis.com/books/9781003218555</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Losing the cybersecurity war : and what we can do to stop it ent://SD_ILS/0/SD_ILS:590788 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;King, Steve (Cybersecurity expert), author.&#160;Chaudry, Kiren, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003331773">https://www.taylorfrancis.com/books/9781003331773</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero trust journey across the digital estate ent://SD_ILS/0/SD_ILS:560700 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pillai, Binil, author.&#160;Kudrati, Abbas, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225096">https://www.taylorfrancis.com/books/9781003225096</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Green computing in network security : energy efficient solutions for business and home ent://SD_ILS/0/SD_ILS:565288 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sharma, Deepak Kumar, editor.&#160;Gupta, Koyel Datta, editor.&#160;Dwivedi, Rinky, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003097198">https://www.taylorfrancis.com/books/9781003097198</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network forensics : privacy and security ent://SD_ILS/0/SD_ILS:555626 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bijalwan, Anchit, author.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045908">https://www.taylorfrancis.com/books/9781003045908</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:557931 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number&#160;TK5102.94 .A44 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced cybersecurity technologies ent://SD_ILS/0/SD_ILS:559536 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Moseley, Ralph, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003096894">https://www.taylorfrancis.com/books/9781003096894</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for ehealth : a simplified guide to practical cybersecurity for non-technical healthcare stakeholders &amp; practitioners ent://SD_ILS/0/SD_ILS:566470 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Ogu, Emmanuel C., author.<br/>Preferred Shelf Number&#160;R859.7 .S43<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003254416">https://www.taylorfrancis.com/books/9781003254416</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> National security in the new world order : government and the technology of information ent://SD_ILS/0/SD_ILS:568976 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Monti, Andrea, 1967- author.&#160;Wacks, Raymond, author.<br/>Preferred Shelf Number&#160;JF1525 .A8<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367809775">https://www.taylorfrancis.com/books/9780367809775</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices ent://SD_ILS/0/SD_ILS:553601 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Alexandrou, Alex (Professor of information technology security), author.<br/>Preferred Shelf Number&#160;HV6773<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:553885 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kendi siteni kendin koru ent://SD_ILS/0/SD_ILS:524306 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;B&uuml;y&uuml;kg&ouml;ze, Selma.&#160;El, &Ccedil;a&#287;r&#305;.<br/>Preferred Shelf Number&#160;TK5105.59 B898 2022<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> PCI COMPLIANCE understand and implement effective pci data security standard compliance. ent://SD_ILS/0/SD_ILS:549842 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Williams, Branden R., author.&#160;Adamson, James K.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003100300">https://www.taylorfrancis.com/books/9781003100300</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security leader's communication playbook : bridging the gap between security and the business ent://SD_ILS/0/SD_ILS:551869 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Brown, Jeffrey W., author.<br/>Preferred Shelf Number&#160;HD30.38 .B76 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003100294">https://www.taylorfrancis.com/books/9781003100294</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> INTERDISCIPLINARY APPROACH TO MODERN NETWORK SECURITY ent://SD_ILS/0/SD_ILS:571220 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pramanik, Sabyasachi, 1978-&#160;Sharma, Anand.&#160;Bhatia, Surbhi, 1988-&#160;Le, Dac-Nhuong, 1983-<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003147176">https://www.taylorfrancis.com/books/9781003147176</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security awareness design in the new normal age ent://SD_ILS/0/SD_ILS:585813 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Goucher, Wendy, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003194583">https://www.taylorfrancis.com/books/9781003194583</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical introduction to enterprise network and security management ent://SD_ILS/0/SD_ILS:589572 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Shin, Bongsik, author.<br/>Preferred Shelf Number&#160;TK5105.548 .S55 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003123699">https://www.taylorfrancis.com/books/9781003123699</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to the cyber ranges ent://SD_ILS/0/SD_ILS:592470 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pandey, Bishwajeet, author.&#160;Ahmad, Shabeer (Electronics engineer), author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003206071">https://www.taylorfrancis.com/books/9781003206071</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security analytics : a data centric approach to information security ent://SD_ILS/0/SD_ILS:592471 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Khurana, Mehak, editor.&#160;Mahajan, Shilpa, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003206088">https://www.taylorfrancis.com/books/9781003206088</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity : a practical engineering approach ent://SD_ILS/0/SD_ILS:558400 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Santos, Henrique, 1960- author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/e/9780429286742">https://www.taylorfrancis.com/books/e/9780429286742</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advancing computational intelligence techniques for security systems design ent://SD_ILS/0/SD_ILS:564480 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sharma, Uzzal, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003229704">https://www.taylorfrancis.com/books/9781003229704</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools ent://SD_ILS/0/SD_ILS:568141 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Moallem, Abbas, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003038429">https://www.taylorfrancis.com/books/9781003038429</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO. ent://SD_ILS/0/SD_ILS:568484 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Das, Ravindra, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003305309">https://www.taylorfrancis.com/books/9781003305309</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Authorization and access control : foundations, frameworks, and applications ent://SD_ILS/0/SD_ILS:570370 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Mahalle, Parikshit N., author.&#160;Bhong, Shashikant S., author.&#160;Shinde, Gitanjali Rahul, 1983- author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003268482">https://www.taylorfrancis.com/books/9781003268482</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vehicular communications for smart cars : protocols, applications and security concerns ent://SD_ILS/0/SD_ILS:576675 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Chowdhury, Niaz, 1984- author.&#160;Mackenzie, L. M., author.<br/>Preferred Shelf Number&#160;TE228.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315110905">https://www.taylorfrancis.com/books/9781315110905</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Creating an information security program from scratch ent://SD_ILS/0/SD_ILS:576963 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 W55 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093688">https://www.taylorfrancis.com/books/9781003093688</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs ent://SD_ILS/0/SD_ILS:577899 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Chowdhury, Rajdeep, editor.&#160;Niranjan, S. K., editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity public policy : SWOT analysis conducted on 43 countries ent://SD_ILS/0/SD_ILS:578078 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Fowler, Bradley, 1968- author.&#160;Maranga, Kennedy M., 1965- author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003259145">https://www.taylorfrancis.com/books/9781003259145</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Holistic approach to quantum cryptography in cyber security ent://SD_ILS/0/SD_ILS:578140 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Shashi Bhushan, 1928- editor.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003296034">https://www.taylorfrancis.com/books/9781003296034</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security handbook ent://SD_ILS/0/SD_ILS:584442 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Jhanjhi, Noor Zaman, 1972- editor.&#160;Hussain, Khalid, editor.&#160;Humayun, Mamoona, editor.&#160;Abdullah, Azween Bin, 1961- editor.&#160;Tavares, Jo&atilde;o Manuel R. S., editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367808228">https://www.taylorfrancis.com/books/9780367808228</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Security Hippie. ent://SD_ILS/0/SD_ILS:587563 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Engel, Barak.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elektronik harp ent://SD_ILS/0/SD_ILS:514348 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pakfiliz, Ahmet G&uuml;ng&ouml;r.<br/>Preferred Shelf Number&#160;UG485 P35 2021<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A&#287; y&ouml;netimi ve bilgi g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:516275 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bilge, Alper.&#160;Ka&ccedil;maz, Emre.<br/>Preferred Shelf Number&#160;TK5105.59 A98 2021<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cyber-security education : principles and policies ent://SD_ILS/0/SD_ILS:562204 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Austin, Greg, 1951- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C91813 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367822576">https://www.taylorfrancis.com/books/9780367822576</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control ent://SD_ILS/0/SD_ILS:563283 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Jeyanthi, N., 1977- author.&#160;Ma, Kun (Computer scientist), author.&#160;Perumal, Thinagaran, author.&#160;Thandeeswaran, N., author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003034049">https://www.taylorfrancis.com/books/9781003034049</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SECURING SOCIAL NETWORKS IN CYBERSPACE ent://SD_ILS/0/SD_ILS:566336 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003134527">https://www.taylorfrancis.com/books/9781003134527</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security architecture : how &amp; why ent://SD_ILS/0/SD_ILS:551177 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Madsen, Tom, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003339380">https://www.taylorfrancis.com/books/9781003339380</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY ISSUES IN EMERGING TECHNOLOGIES ent://SD_ILS/0/SD_ILS:564291 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Maglaras, Leandros, editor.&#160;Kantzavelou, Ioanna, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003109952">https://www.taylorfrancis.com/books/9781003109952</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber defense mechanisms security, privacy, and challenges ent://SD_ILS/0/SD_ILS:571884 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kumar, Gautam, 1990-&#160;Saini, Dinesh Kumar, 1974-&#160;Cuong, Nguyen Ha Huy.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367816438">https://www.taylorfrancis.com/books/9780367816438</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing security foundations and challenges ent://SD_ILS/0/SD_ILS:580601 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CyRM? mastering the management of cybersecurity ent://SD_ILS/0/SD_ILS:589538 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Martin, David X., author.<br/>Preferred Shelf Number&#160;HD30.38 .M37 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003098232">https://www.taylorfrancis.com/books/9781003098232</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and employee behaviour : how to reduce risk through employee education, training and awareness ent://SD_ILS/0/SD_ILS:590294 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;McIlwraith, Angus, author.<br/>Preferred Shelf Number&#160;HD30.38<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429281785">https://www.taylorfrancis.com/books/9780429281785</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Routledge companion to global cyber-security strategy ent://SD_ILS/0/SD_ILS:561317 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Romaniuk, Scott N., 1979- editor.&#160;Manjikian, Mary, editor.<br/>Preferred Shelf Number&#160;UA163 .R68 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429399718">https://www.taylorfrancis.com/books/9780429399718</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise cybersecurity in digital business : building a cyber resilient organization ent://SD_ILS/0/SD_ILS:591406 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Evans, Ariel, author.<br/>Preferred Shelf Number&#160;HD30.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003052616">https://www.taylorfrancis.com/books/9781003052616</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> T&uuml;rkiye&rsquo;de ve d&uuml;nyada siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:514958 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;&Ccedil;elikta&#351;, Bar&#305;&#351; .<br/>Preferred Shelf Number&#160;UG485 C45 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Uygulamalarla siber g&uuml;venli&#287;e giri&#351; ent://SD_ILS/0/SD_ILS:510151 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;TK5105.59.A39 U94 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Enterprise level security 2 advanced topics in an uncertain world ent://SD_ILS/0/SD_ILS:552772 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Foltz, Kevin E., author.&#160;Simpson, William Randolph, 1946- author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003080787">https://www.taylorfrancis.com/books/9781003080787</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Attribute-Based Encryption and Access Control ent://SD_ILS/0/SD_ILS:569930 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Huang, Dijiang.&#160;Dong, Qiuxiang.&#160;Zhu, Yan (Professor of computer security)<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781351210607">https://www.taylorfrancis.com/books/9781351210607</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ENTERPRISE LEVEL SECURITY 1 &amp; 2 ent://SD_ILS/0/SD_ILS:581770 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Foltz, Kevin E.&#160;Simpson, William Randolph, 1946-<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003082118">https://www.taylorfrancis.com/books/9781003082118</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection ensuring data availability ent://SD_ILS/0/SD_ILS:582517 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;De Guise, Preston.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367463496">https://www.taylorfrancis.com/books/9780367463496</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity fundamentals a real-world perspective ent://SD_ILS/0/SD_ILS:582678 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Thakur, Kutub.&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003035626">https://www.taylorfrancis.com/books/9781003035626</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber strategy : risk-driven security and resiliency ent://SD_ILS/0/SD_ILS:585453 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Siegel, Carol A., author.&#160;Sweeney, Mark, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429323003">https://www.taylorfrancis.com/books/9780429323003</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed denial of service attacks : real-world detection and mitigation ent://SD_ILS/0/SD_ILS:577648 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Brooks, R. R. (Richard R.), author.&#160;&Ouml;z&ccedil;elik, &#304;lker, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315213125">https://www.taylorfrancis.com/books/9781315213125</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity education for awareness and compliance ent://SD_ILS/0/SD_ILS:482092 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Vasileiou, Ismini, 1980- editor.&#160;Furnell, Steven, 1970- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Countering cyber attacks and preserving the integrity and availability of critical systems ent://SD_ILS/0/SD_ILS:482177 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Geetha, S., 1979- editor.&#160;Phamila, Asnath Victy, 1978- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime ent://SD_ILS/0/SD_ILS:483013 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484846 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bassioni, Ghada. editor.&#160;Kebe, Cheikh M.F. editor.&#160;Gueye, Assane. editor. (orcid)0000-0001-6469-4716&#160;Ndiaye, Ababacar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484847 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Askarov, Aslan. editor.&#160;Hansen, Ren&eacute; Rydhof. editor.&#160;Rafnsson, Willard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Siber g&uuml;venlik ve savunma : standartlar ve uygulamalar ent://SD_ILS/0/SD_ILS:462283 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Preferred Shelf Number&#160;TK5105.59 S53 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486944 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349&#160;Lampropoulos, Konstantinos. editor.&#160;Mar&iacute;n Tordera, Eva. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Usta, G&ouml;khan.<br/>Preferred Shelf Number&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484518 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249&#160;Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberdanger Understanding and Guarding Against Cybercrime ent://SD_ILS/0/SD_ILS:485936 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Willems, Eddy. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and security challenges in emerging networks ent://SD_ILS/0/SD_ILS:481975 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Abassi, Ryma, 1980- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483112 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Nandi, Sukumar. editor.&#160;Jinwala, Devesh. editor.&#160;Singh, Virendra. editor.&#160;Laxmi, Vijay. editor.&#160;Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483366 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694&#160;Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483889 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484908 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Lin, Zhiqiang. editor.&#160;Papamanthou, Charalampos. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400107 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Exploit geli&#351;tirme 101 ent://SD_ILS/0/SD_ILS:389077 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;QA76.9.A25 A59 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400186 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Chowdhury, Kaushik Roy. editor.&#160;Di Felice, Marco. editor.&#160;Matta, Ibrahim. editor.&#160;Sheng, Bo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400306 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Budaghyan, Lilya. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:459204 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Winkler, Ira, author.&#160;Gomes, Araceli Treu, author.&#160;Shackleford, Dave, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:459114 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Faircloth, Jeremy, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:459335 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Li, Shancang, author.&#160;Xu, Li D., author.&#160;Romdhani, Imed, contributor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety of web applications : risks, encryption and handling vulnerabilities with PHP ent://SD_ILS/0/SD_ILS:459467 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Quinton, &Eacute;ric, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in network functions virtualization ent://SD_ILS/0/SD_ILS:459901 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Zhang, Zonghua, author.&#160;Meddahi, Ahmed, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:459518 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of cyber safety : computer and mobile device safety made easy ent://SD_ILS/0/SD_ILS:459044 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sammons, John, author.&#160;Cross, Michael, 1965- author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Griffor, Edward R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:459146 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Andress, Jason, author.&#160;Leary, Mark, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Service Oriented Architectures. ent://SD_ILS/0/SD_ILS:542633 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Williams, Walter, author.&#160;CRC Press LLC.<br/>Preferred Shelf Number&#160;TK5105.5828 .W55 2017<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing a network vulnerability assessment ent://SD_ILS/0/SD_ILS:543286 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;PELTIER, THOMAS R.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429210747">https://www.taylorfrancis.com/books/9780429210747</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it. ent://SD_ILS/0/SD_ILS:542757 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;VARSALONE, JESSE.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:458665 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Willson, David (Lawyer), author.&#160;Dalziel, Henry, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:458777 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNS security : defending the domain name system ent://SD_ILS/0/SD_ILS:458935 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Liska, Allan, author.&#160;Stowe, Geoffrey, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh Hour CISSP&reg; ent://SD_ILS/0/SD_ILS:459073 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Conrad, Eric, author.&#160;Seth Misenar, author.&#160;Joshua Feldman, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:459217 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Andress, Jason, author.&#160;Linn, Ryan, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:458926 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Fowler, Kevvie, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:458789 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Chapman, Chris, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:458953 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Haaster, Jelle van, author.&#160;Gevers, Rickey, author.&#160;Sprengers, Martijn, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:355514 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Gonzalez, Deborah, author.<br/>Preferred Shelf Number&#160;ONLINE(355514.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:355363 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Williams, Branden R., author.&#160;Chuvakin, Anton A., author.&#160;Milroy, Derek, editor<br/>Preferred Shelf Number&#160;ONLINE(355363.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A&#287; ve yaz&#305;l&#305;m g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:379758 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;&Ccedil;ontar, Furkan.<br/>Preferred Shelf Number&#160;TK5105.59 C66 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber istihbarat ent://SD_ILS/0/SD_ILS:384051 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kele&#351;temur, Atalay<br/>Preferred Shelf Number&#160;QA76.9.A25 K45 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Dissecting the hack : the v3rb0ten network ent://SD_ILS/0/SD_ILS:458624 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Street, Jayson E., author.&#160;Sims, Kristin, author.&#160;Baskin, Brian, author.&#160;Martin, Brian, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tam kapsaml&#305; sanal test laboratuvar&#305; kurulumu ve uygulamal&#305; s&#305;zma testleri ent://SD_ILS/0/SD_ILS:513467 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Yal&ccedil;&#305;nkaya, Mehmet Ali, yazar.&#160;K&uuml;&ccedil;&uuml;ksille, Ecir U&#287;ur, yazar.<br/>Preferred Shelf Number&#160;TK5105.59 Y35 2015<br/>Format:&#160;Regular print<br/>Availability&#160;Beytepe Library~1<br/> Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments ent://SD_ILS/0/SD_ILS:458699 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Richter, Andy, author.&#160;Wood, Jeremy, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Case studies in secure computing : achievements and trends ent://SD_ILS/0/SD_ILS:541687 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Issac, Biju, editor.&#160;Israr, Nauman, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C426 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482207071">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security ent://SD_ILS/0/SD_ILS:342168 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Perez, Andre.<br/>Preferred Shelf Number&#160;ONLINE(342168.1)<br/>Electronic Access&#160;ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a> MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a> Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Cybercrime and cyberwarfare ent://SD_ILS/0/SD_ILS:341980 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bernik, Igor, author.<br/>Preferred Shelf Number&#160;ONLINE(341980.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:341997 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Touhill, Gregory J., author.&#160;Touhill, C. J., 1938- author.<br/>Preferred Shelf Number&#160;ONLINE(341997.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a> ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a> MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:355853 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sood, Aditya K., author.&#160;Enbody, Richard J., author.<br/>Preferred Shelf Number&#160;ONLINE(355853.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data analysis for network cyber-security ent://SD_ILS/0/SD_ILS:354757 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Adams, Niall M., 1968-&#160;Heard, Nicholas.<br/>Preferred Shelf Number&#160;TK5105.59 D375 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:355770 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Andress, Jason, author.<br/>Preferred Shelf Number&#160;ONLINE(355770.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE(355909.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security careers skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:356043 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Walker, Stephen W.&#160;Foushee, James E.<br/>Preferred Shelf Number&#160;ONLINE(356043.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of digital privacy simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:356123 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Cherry, Denny.&#160;LaRock, Thomas.<br/>Preferred Shelf Number&#160;ONLINE(356123.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network and system security ent://SD_ILS/0/SD_ILS:306690 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing information security ent://SD_ILS/0/SD_ILS:306692 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:306695 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Snedaker, Susan.&#160;Rima, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:543619 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;TK5105.59 .P463 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881606">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:547748 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number&#160;TK5105.59 .B474 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466582095">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:539726 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;DeFranco, Joanna F., author.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:544118 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S734 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security for multihop wireless networks ent://SD_ILS/0/SD_ILS:538652 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Khan, Shafiullah, editor.&#160;Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466578043">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:540452 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Memon, Qurban Ali, editor.<br/>Preferred Shelf Number&#160;QA76.9 .D5 D55626 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315216218">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:541163 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Middleton, Bruce, 1953, author.<br/>Preferred Shelf Number&#160;TK5105.59 .M53 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482206487">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:543676 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 S7354 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes ent://SD_ILS/0/SD_ILS:313044 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Fadyushin, Vyacheslav.<br/>Preferred Shelf Number&#160;ONLINE(313044.1)<br/>Electronic Access&#160;Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied network security monitoring collection, detection, and analysis ent://SD_ILS/0/SD_ILS:356122 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sanders, Chris.&#160;Smith, Jason.<br/>Preferred Shelf Number&#160;ONLINE(356122.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:306699 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pauli, Joshua J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:306649 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kane, Greg, editor of compilation.&#160;Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in cyber security technology, operations, and experiences ent://SD_ILS/0/SD_ILS:239591 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Hsu, D. Frank (Derbiau Frank), 1948-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Preferred Shelf Number&#160;HF5548.37 W67 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Official (ISC)[superscript 2] guide to the CAP CBK ent://SD_ILS/0/SD_ILS:540750 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Howard, Patrick D., author.<br/>Preferred Shelf Number&#160;TK5105.59 .H673 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439820766">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;HD30.38 .B76 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Responsive Security ent://SD_ILS/0/SD_ILS:542438 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kang, Meng-Chow, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:546623 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Khoury, Franjieh El., author.<br/>Preferred Shelf Number&#160;TK7882 .B56 K46 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466502147">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:547855 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;TK5105.59 .H3532 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> FISMA and the risk management framework the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:145936 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Gantz, Stephen D.&#160;Philpott, Daniel R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:146934 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Tam, Kenneth.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:539715 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Mohammed, Mohssen, 1982, author.&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;QA76.76 .C68 M64 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466557284">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Williams, Barry L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 .W5495 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Preferred Shelf Number&#160;TK5105.59 M48 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security metrics a beginner's guide ent://SD_ILS/0/SD_ILS:293238 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Wong, Caroline.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the clicks network security in the age of social media ent://SD_ILS/0/SD_ILS:293240 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Bahadur, Gary.&#160;Inasi, Jason.&#160;Carvalho, Alex de.&#160;Powell, Juliette, 1976-&#160;Valencia, Connie.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application security a beginner's guide ent://SD_ILS/0/SD_ILS:293241 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Sullivan, Bryan, 1974-&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle WebLogic server 11g administration handbook ent://SD_ILS/0/SD_ILS:293243 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Alapati, Sam R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:276700 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Robust control system networks how to achieve reliable control after Stuxnet ent://SD_ILS/0/SD_ILS:280181 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Langner, Ralph.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operating systems demystified ent://SD_ILS/0/SD_ILS:294101 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;McHoes, Ann McIver, 1950-&#160;Ballew, Joli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:241837 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:541627 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Ganguly, Debashis., author.&#160;Lahiri, Shibamouli.<br/>Preferred Shelf Number&#160;TK5105.59 .G36 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:545796 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Masud, Mehedy., author.&#160;Khan, Latifur.&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;QA76.9 .D343 M385 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:146274 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Fichera, Joe, 1966-&#160;Bolt, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:146056 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Cole, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:148429 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Chuvakin, Anton.&#160;Williams, Branden R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:148516 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Clarke, Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISSP study guide ent://SD_ILS/0/SD_ILS:148769 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Conrad, Eric, 1967-&#160;Misenar, Seth.&#160;Feldman, Joshua.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:145254 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Winterfeld, Steve.&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook on securing cyber-physical critical infrastructure ent://SD_ILS/0/SD_ILS:145579 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Das, Sajal K.&#160;Kant, Krishna.&#160;Zhang, Nan, 1982-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:145689 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Carvey, Harlan A.&#160;Kolde, Jennifer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:148731 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Oriyano, Sean-Philip.&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:545161 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Tiller, James S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T56 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439880289">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:546687 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Speed, Tyler Justin., author.<br/>Preferred Shelf Number&#160;TK5105.59 .S643 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439809839">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cybersecurity : public sector threats and responses ent://SD_ILS/0/SD_ILS:545406 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Andreasson, Kim J.<br/>Preferred Shelf Number&#160;TK5105.59 .C927 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439846643">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Preferred Shelf Number&#160;TK5105.878 W54 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:271446 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S782 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security firewalls and VPNs ent://SD_ILS/0/SD_ILS:271452 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;TK5105.59 S758 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed web applications web application security secrets and solutions ent://SD_ILS/0/SD_ILS:293277 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Scambray, Joel.&#160;Liu, Vincent.&#160;Sima, Caleb.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing an IAM framework with Oracle identity and access management suite ent://SD_ILS/0/SD_ILS:293289 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Scheidel, Jeff.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac OS X system administration ent://SD_ILS/0/SD_ILS:293298 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Hart-Davis, Guy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networking a beginner's guide ent://SD_ILS/0/SD_ILS:293314 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 24 deadly sins of software security programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:293319 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Howard, Michael, 1965-&#160;LeBlanc, David, 1960-&#160;Viega, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco ASA configuration ent://SD_ILS/0/SD_ILS:293322 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Deal, Richard A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fedora 7 &amp; Red Hat Enterprise Linux the complete reference ent://SD_ILS/0/SD_ILS:293328 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Petersen, Richard, 1949-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Windows server 2008 the complete reference ent://SD_ILS/0/SD_ILS:293367 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Ruest, Danielle.&#160;Ruest, Nelson.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Windows server 2008 a beginner's guide ent://SD_ILS/0/SD_ILS:293368 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Citrix Access Suite 4 advanced concepts the official guide ent://SD_ILS/0/SD_ILS:293372 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kaplan, Steve, 1955-&#160;Jones, Andy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CNET do-it-yourself home networking projects 24 cool things you didn't know you could do! ent://SD_ILS/0/SD_ILS:293687 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Aspinwall, Jim.&#160;CNET (Firm)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Home networking demystified a self-teaching guide ent://SD_ILS/0/SD_ILS:294143 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Long, Larry E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:299263 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Halpert, Ben, 1986-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wars of disruption and resilience cybered conflict, power, and national security ent://SD_ILS/0/SD_ILS:244312 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Demchak, Chris C.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:539761 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Liu, Lei, 1968, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 L587 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:541595 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Scherling, Mark., author.<br/>Preferred Shelf Number&#160;HF5548.37 .S34 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cyber warfare techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:147479 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Andress, Jason.&#160;Winterfeld, Steve.&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:148980 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:148785 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Andress, Jason.&#160;Linn, Ryan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:145371 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:145659 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Carvey, Harlan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ninja hacking unconventional penetration testing tactics and techniques ent://SD_ILS/0/SD_ILS:146263 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Wilhelm, Thomas.&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour CISSP study guide ent://SD_ILS/0/SD_ILS:146597 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Conrad, Eric, 1967-&#160;Misenar, Seth.&#160;Feldman, Joshua.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:148225 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Faircloth, Jeremy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the SSCP CBK ent://SD_ILS/0/SD_ILS:543369 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Tipton, Harold F.&#160;International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number&#160;QA76.3 .O3845 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439804841">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:545590 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Joshi, R. C., author.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;QA76.9 .A25 J66 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Tibble, Ian., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Secure semantic service-oriented systems ent://SD_ILS/0/SD_ILS:540399 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;TK5105.5828 .T48 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420073324">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:541852 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Tiller, James S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T55 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security of self-organizing networks : MANET, WSN, WMN, VANET ent://SD_ILS/0/SD_ILS:544711 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;TK5105.77 .S43 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439819203">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> China's cyberwarfare capability ent://SD_ILS/0/SD_ILS:281481 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Marvel, Elisabette M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:306328 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Kissell, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Moeller, Robert R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive Radio Networking and Security A Game-Theoretic View ent://SD_ILS/0/SD_ILS:238948 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Liu, K. J. Ray.&#160;Wang, Beibei.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security A Decision and Game-Theoretic Approach ent://SD_ILS/0/SD_ILS:237887 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Alpcan, Tansu.&#160;Ba&#351;ar, Tamer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:542098 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;HG1710 .H34 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:148953 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:149185 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Prowell, Stacy J.&#160;Kraus, Rob.&#160;Borkin, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Lillard, Terrence.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour network+ exam N10-004 study guide ent://SD_ILS/0/SD_ILS:146455 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Alpern, Naomi J.&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:148342 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Chuvakin, Anton.&#160;Williams, Branden R.&#160;Spangenberg, Ward.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:149103 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Shema, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2026-01-11T22:30:28Z 2026-01-11T22:30:28Z Author&#160;Haines, Brad.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>