Search Results for Computer networks -- Security measures.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list
2026-01-11T22:30:28Z
Behavioral insights in cybersecurity : a guide to digital human factors
ent://SD_ILS/0/SD_ILS:567885
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sachs, Dustin S., author.<br/>Preferred Shelf Number ZA3086.5 .C93<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606345">https://www.taylorfrancis.com/books/9781003606345</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed security monitoring and resilient cooperative control
ent://SD_ILS/0/SD_ILS:567906
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Wen, Guanghui, 1983- author. Lv, Yuezu, 1991- author. Zhao, Dan, author. Lei, Xuqiang, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003669913">https://www.taylorfrancis.com/books/9781003669913</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent networks and systems : advanced technologies and applications
ent://SD_ILS/0/SD_ILS:553413
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Siddique, N. H., editor. Arefin, Mohammad Shamsul, editor. Noori, Sheak Rashed Haider, editor. Kaiser, M. Shamim, editor.<br/>Preferred Shelf Number QA76.76 .E95<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032659770">https://www.taylorfrancis.com/books/9781032659770</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark essentials : simplifying network security and troubleshooting
ent://SD_ILS/0/SD_ILS:580421
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Soni, Arun, author.<br/>Preferred Shelf Number TK5105.55<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003539261">https://www.taylorfrancis.com/books/9781003539261</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zero-trust learning : applications in modern network security
ent://SD_ILS/0/SD_ILS:580582
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kaushal, Chetna, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781779643575">https://www.taylorfrancis.com/books/9781779643575</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure detection and control in cyber-physical systems : working in the presence of malicious data
ent://SD_ILS/0/SD_ILS:574476
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Yan, Jiaqi, author. Mo, Yilin, author. Wen, Changyun, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003409199">https://www.taylorfrancis.com/books/9781003409199</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
NEW PERSPECTIVES IN BEHAVIORAL CYBERSECURITY II human behavior for.
ent://SD_ILS/0/SD_ILS:560113
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Preferred Shelf Number ZA3086.5 .C93<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003599142">https://www.taylorfrancis.com/books/9781003599142</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics in next generation internet for medical things : balancing security and sustainability
ent://SD_ILS/0/SD_ILS:575627
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Saini, Hemant Kumar, editor Rani, Sita, editor Ouaissa, Mariya, editor Ouaissa, Mariyam, editor Abou El Houda, Zakaria, editor<br/>Preferred Shelf Number R859.7 .I59 D54 2026 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640325">https://www.taylorfrancis.com/books/9781003640325</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCE
ent://SD_ILS/0/SD_ILS:553331
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570905">https://www.taylorfrancis.com/books/9781003570905</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital education : security, readiness, and technology enhancement
ent://SD_ILS/0/SD_ILS:560183
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Susanto, Heru, 1977- editor Leu, Fang-Yie, editor Bakrī, Saʻd ʻAlī al-Ḥājj, editor Haghi, A. K., editor<br/>Preferred Shelf Number LB1028.57<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032670782">https://www.taylorfrancis.com/books/9781032670782</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The hack is back : techniques to beat hackers at their own games
ent://SD_ILS/0/SD_ILS:558496
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Varsalone, Jesse, author. Haller, Christopher, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003033301">https://www.taylorfrancis.com/books/9781003033301</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:572623
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PRIVACY IN VEHICULAR NETWORKS challenges and solutions.
ent://SD_ILS/0/SD_ILS:552331
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Ma, Baihe. Wang, Xu. Ni, Wei. Liu, Ren Ping.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003518044">https://www.taylorfrancis.com/books/9781003518044</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures. Protecting health information
ent://SD_ILS/0/SD_ILS:580393
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number R864<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527213">https://www.taylorfrancis.com/books/9781003527213</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : AI and governance
ent://SD_ILS/0/SD_ILS:584311
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37 .K57 2025 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of AI-driven threat detection and prevention : a holistic approach
ent://SD_ILS/0/SD_ILS:569783
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bhambri, Pankaj, editor. Anand A., Jose, 1975- editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003521020">https://www.taylorfrancis.com/books/9781003521020</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless ad-hoc and sensor networks : architecture, protocols, and applications
ent://SD_ILS/0/SD_ILS:582337
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Singh, Pawan, editor. Kumar, Sudesh (Computer scientist), editor. Gupta, Sachin Kumar, editor. Rai, Abhay Kumar, editor. Saif, Abdu, editor.<br/>Preferred Shelf Number TK5105.77<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003528982">https://www.taylorfrancis.com/books/9781003528982</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Agile security in the digital era : challenges and cybersecurity trends
ent://SD_ILS/0/SD_ILS:563898
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Zaydi, Mounia, editor.<br/>Preferred Shelf Number QA76.9 .A25 A414 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478676">https://www.taylorfrancis.com/books/9781003478676</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Humans and cyber security : how organizations can enhance resilience through human factors
ent://SD_ILS/0/SD_ILS:568695
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Widdowson, Amanda, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003427681">https://www.taylorfrancis.com/books/9781003427681</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimum spending on cybersecurity measures : digital privacy and data protection
ent://SD_ILS/0/SD_ILS:574605
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : third party risk management
ent://SD_ILS/0/SD_ILS:584312
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37 .K57 2025 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing : a journey into the next frontier of information and communication security
ent://SD_ILS/0/SD_ILS:589045
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Hammoudeh, Mohammad, editor. Essa, Abdullah T., editor. Sherbeeni, Amro M., editor. Firth, Clinton M., editor. Essa, Abdullah S. (Abdullah Saad) editor.<br/>Preferred Shelf Number QA76.889<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003475286">https://www.taylorfrancis.com/books/9781003475286</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ADVANCEMENTS IN CYBERSECURITY next-generation systems and.
ent://SD_ILS/0/SD_ILS:589110
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003546153">https://www.taylorfrancis.com/books/9781003546153</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent approaches to cyber security
ent://SD_ILS/0/SD_ILS:556106
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Shekokar, Narendra M., editor. Vasudevan, Hari, 1969- editor. Durbha, Surya Srinivas, editor. Michalas, Antonis, editor. Nagarhalli, Tatwadarshi P., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003408307">https://www.taylorfrancis.com/books/9781003408307</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ARTIFICIAL INTELLIGENCE AND IOT FOR CYBER SECURITY SOLUTIONS IN SMART CITIES
ent://SD_ILS/0/SD_ILS:556161
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sharma, Smita.<br/>Preferred Shelf Number TD159.4<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003459835">https://www.taylorfrancis.com/books/9781003459835</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ZERO TRUST FRAMEWORK AND PRIVILEGED ACCESS MANAGEMENT (PAM)
ent://SD_ILS/0/SD_ILS:555252
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Das, Ravindra.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470021">https://www.taylorfrancis.com/books/9781003470021</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
New perspectives in behavioral cybersecurity : human behavior and decision-making models
ent://SD_ILS/0/SD_ILS:564828
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Patterson, Wayne, 1945- editor.<br/>Preferred Shelf Number ZA3086.5 .C93<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003415060">https://www.taylorfrancis.com/books/9781003415060</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and business intelligence : innovations and machine learning for cyber risk management
ent://SD_ILS/0/SD_ILS:553989
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Abedin, Mohammad Zoynul, editor. Hájek, Petr, editor.<br/>Preferred Shelf Number HD38.7<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003285854">https://www.taylorfrancis.com/books/9781003285854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:524308
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2024<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Protecting information assets and IT infrastructure in the Cloud
ent://SD_ILS/0/SD_ILS:554222
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number QA76.585 .D37 2024<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003459569">https://www.taylorfrancis.com/books/9781003459569</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Why CISOs fail
ent://SD_ILS/0/SD_ILS:577207
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Engel, Barak, author.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:586024
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The zero trust framework : threat hunting & quantum mechanics
ent://SD_ILS/0/SD_ILS:592723
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003392965">https://www.taylorfrancis.com/books/9781003392965</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems ICCCES 2022
ent://SD_ILS/0/SD_ILS:527539
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bindhu, V. editor. Tavares, João Manuel R. S. editor. Vuppalapati, Chandrasekar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7753-4">https://doi.org/10.1007/978-981-19-7753-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Computing and Applications Proceedings of ICDIC 2020
ent://SD_ILS/0/SD_ILS:528678
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Rao, B. Narendra Kumar. editor. Balasubramanian, R. editor. Wang, Shiuh-Jeng. editor. Nayak, Richi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Communication Technologies and Virtual Mobile Networks Proceedings of ICICV 2022
ent://SD_ILS/0/SD_ILS:528870
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Rajakumar, G. editor. Du, Ke-Lin. editor. Vuppalapati, Chandrasekar. editor. Beligiannis, Grigorios N. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-1844-5">https://doi.org/10.1007/978-981-19-1844-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the 6th International Conference on Advance Computing and Intelligent Engineering ICACIE 2021
ent://SD_ILS/0/SD_ILS:528875
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pati, Bibudhendu. editor. Panigrahi, Chhabi Rani. editor. Mohapatra, Prasant. editor. Li, Kuan-Ching. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2225-1">https://doi.org/10.1007/978-981-19-2225-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolution in Computational Intelligence Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2022)
ent://SD_ILS/0/SD_ILS:529006
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bhateja, Vikrant. editor. Yang, Xin-She. editor. Lin, Jerry Chun-Wei. editor. Das, Ranjita. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7513-4">https://doi.org/10.1007/978-981-19-7513-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1
ent://SD_ILS/0/SD_ILS:529010
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Singh, Yashwant. editor. Singh, Pradeep Kumar. editor. Kolekar, Maheshkumar H. editor. Kar, Arpan Kumar. editor. Gonçalves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2023
ent://SD_ILS/0/SD_ILS:529021
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Ranganathan, G. editor. EL Allioui, Youssouf. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
ent://SD_ILS/0/SD_ILS:529055
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Schiffner, Stefan. editor. Ziegler, Sébastien. editor. (orcid)0000-0001-7255-4975 Jensen, Meiko. editor. (orcid)0009-0003-2397-9813 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2022
ent://SD_ILS/0/SD_ILS:526883
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Ranganathan, G. editor. Fernando, Xavier. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Pattern Recognition Proceedings of CIPR 2023
ent://SD_ILS/0/SD_ILS:527264
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Das, Asit Kumar. editor. Nayak, Janmenjoy. editor. Naik, Bighnaraj. editor. Vimal, S. editor. Pelusi, Danilo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3734-9">https://doi.org/10.1007/978-981-99-3734-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023
ent://SD_ILS/0/SD_ILS:528415
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Giri, Debasis. editor. Gollmann, Dieter. editor. Ponnusamy, S. editor. Kouichi, Sakurai. editor. Stanimirović, Predrag S. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mind the tech gap : addressing the conflicts between IT and security teams
ent://SD_ILS/0/SD_ILS:562665
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Robinson, Nikki, author.<br/>Preferred Shelf Number T10.5<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264422">https://www.taylorfrancis.com/books/9781003264422</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine learning, blockchain, and cyber security in smart environments : applications and challenges
ent://SD_ILS/0/SD_ILS:562630
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Tanwar, Sarvesh, editor. Badotra, Sumit, editor. Rana, Ajay, editor.<br/>Preferred Shelf Number TA347 .A78 M333 2023<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003240310">https://www.taylorfrancis.com/books/9781003240310</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI, machine learning and deep learning : a security perspective
ent://SD_ILS/0/SD_ILS:555843
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Hu, Fei, 1972- editor. Hei, Xiali, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003187158">https://www.taylorfrancis.com/books/9781003187158</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ZERO-TRUST - AN INTRODUCTION
ent://SD_ILS/0/SD_ILS:567805
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Madsen, Tom.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003464587">https://www.taylorfrancis.com/books/9781003464587</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic cyber security management
ent://SD_ILS/0/SD_ILS:550021
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003244295">https://www.taylorfrancis.com/books/9781003244295</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity ethics : an introduction
ent://SD_ILS/0/SD_ILS:553941
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Manjikian, Mary, author.<br/>Preferred Shelf Number TK5105.878 .M36 2023<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003248828">https://www.taylorfrancis.com/books/9781003248828</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ağ ve yazılım güvenliği
ent://SD_ILS/0/SD_ILS:524301
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Çontar, Furkan.<br/>Preferred Shelf Number TK5105.59 C66 2023<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cyber Technologies and Emerging Sciences ICCTES 2021
ent://SD_ILS/0/SD_ILS:526691
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Maurya, Sudhanshu. editor. Peddoju, Sateesh K. editor. Ahmad, Badlishah. editor. Chihi, Ines. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2538-2">https://doi.org/10.1007/978-981-19-2538-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and Identity Access Management
ent://SD_ILS/0/SD_ILS:527374
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Rawal, Bharat S. author. Manogaran, Gunasekaran. author. Peter, Alexender. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Trends in Intelligent Systems & Network Security
ent://SD_ILS/0/SD_ILS:527281
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Ben Ahmed, Mohamed. editor. Abdelhakim, Boudhir Anouar. editor. (orcid)0000-0003-4036-9956 Ane, Bernadetta Kwintiana. editor. Rosiyadi, Didi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-15191-0">https://doi.org/10.1007/978-3-031-15191-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Computing and Sustainable Informatics Proceedings of ICMCSI 2023
ent://SD_ILS/0/SD_ILS:527730
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Shakya, Subarna. editor. Papakostas, George. editor. Kamel, Khaled A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0835-6">https://doi.org/10.1007/978-981-99-0835-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Communication Technology and Computing Proceedings of AICTC 2022
ent://SD_ILS/0/SD_ILS:527740
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Goar, Vishal. editor. Kuri, Manoj. editor. Kumar, Rajesh. editor. Senjyu, Tomonobu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9888-1">https://doi.org/10.1007/978-981-19-9888-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology NICE-DT 2023
ent://SD_ILS/0/SD_ILS:527944
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Singh, Sri Niwas. editor. Mahanta, Saurov. editor. Singh, Yumnam Jayanta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1699-3">https://doi.org/10.1007/978-981-99-1699-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security IC4S 2022
ent://SD_ILS/0/SD_ILS:528006
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Tanwar, Sudeep. editor. Wierzchon, Slawomir T. editor. Singh, Pradeep Kumar. editor. Ganzha, Maria. editor. Epiphaniou, Gregory. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1479-1">https://doi.org/10.1007/978-981-99-1479-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next Generation Systems and Networks Proceedings of BITS EEE CON 2022
ent://SD_ILS/0/SD_ILS:528044
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bansal, Hari Om. editor. Ajmera, Pawan K. editor. Joshi, Sandeep. editor. Bansal, Ramesh C. editor. (orcid)0000-0002-1725-2648 Shekhar, Chandra. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0483-9">https://doi.org/10.1007/978-981-99-0483-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Third International Conference on Computing, Communications, and Cyber-Security IC4S 2021
ent://SD_ILS/0/SD_ILS:528473
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Singh, Pradeep Kumar. editor. Wierzchoń, Sławomir T. editor. Tanwar, Sudeep. editor. Rodrigues, Joel J. P. C. editor. Ganzha, Maria. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-1142-2">https://doi.org/10.1007/978-981-19-1142-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolution in Computational Intelligence Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023)
ent://SD_ILS/0/SD_ILS:528820
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bhateja, Vikrant. editor. Yang, Xin-She. editor. Ferreira, Marta Campos. editor. (orcid)0000-0001-9505-5730 Sengar, Sandeep Singh. editor. Travieso-Gonzalez, Carlos M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-6702-5">https://doi.org/10.1007/978-981-99-6702-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI Embedded Assurance for Cyber Systems
ent://SD_ILS/0/SD_ILS:528935
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Wang, Cliff. editor. Iyengar, S.S. editor. Sun, Kun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-42637-7">https://doi.org/10.1007/978-3-031-42637-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deploying the Zero Trust Framework in MSFT Azure
ent://SD_ILS/0/SD_ILS:563851
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Das, Ravindra, editor.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003442578">https://www.taylorfrancis.com/books/9781003442578</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security applications for industry 4.0
ent://SD_ILS/0/SD_ILS:564428
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sujatha, R., editor. Prakash, G., editor. Jhanjhi, Noor Zaman, 1972- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003203087">https://www.taylorfrancis.com/books/9781003203087</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A comprehensive guide to information security management and audit
ent://SD_ILS/0/SD_ILS:581175
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Banoth, Rajkumar, author. Gugulothu, Narsimha, author. Godishala, Aruna Kranthi, author.<br/>Preferred Shelf Number HD38.7<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003322191">https://www.taylorfrancis.com/books/9781003322191</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced computer science applications : recent trends in AI, machine learning, and network security
ent://SD_ILS/0/SD_ILS:583149
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Singh, Karan, 1981- editor. Banda, Latha, 1983- editor. Manjul, Manisha, 1982- editor.<br/>Preferred Shelf Number Q335 .A38 2023<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003369066">https://www.taylorfrancis.com/books/9781003369066</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:573236
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author DeFranco, Joanna F., author. Maley, Bob (Chief Security Officer), author.<br/>Preferred Shelf Number TK5105.59 .D44 2023 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003245223">https://www.taylorfrancis.com/books/9781003245223</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in cyber security and intelligent analytics
ent://SD_ILS/0/SD_ILS:574219
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Verma, Abhishek, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003269144">https://www.taylorfrancis.com/books/9781003269144</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure data management for online learning applications
ent://SD_ILS/0/SD_ILS:561768
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Deborah, L. Jegatha, editor. Vijayakumar, P., editor. Gupta, Brij, 1982- editor. Pelusi, Danilo, editor.<br/>Preferred Shelf Number LC5803 .C65<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264538">https://www.taylorfrancis.com/books/9781003264538</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security threats and challenges facing human life
ent://SD_ILS/0/SD_ILS:589706
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Shekokar, Narendra M., editor. Vasudevan, Hari (Engineer), editor. Durbha, Surya Srinivas, editor. Michalas, Antonis, editor. Nagarhalli, Tatwadarshi P., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003218555">https://www.taylorfrancis.com/books/9781003218555</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Losing the cybersecurity war : and what we can do to stop it
ent://SD_ILS/0/SD_ILS:590788
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author King, Steve (Cybersecurity expert), author. Chaudry, Kiren, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003331773">https://www.taylorfrancis.com/books/9781003331773</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zero trust journey across the digital estate
ent://SD_ILS/0/SD_ILS:560700
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pillai, Binil, author. Kudrati, Abbas, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225096">https://www.taylorfrancis.com/books/9781003225096</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Green computing in network security : energy efficient solutions for business and home
ent://SD_ILS/0/SD_ILS:565288
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sharma, Deepak Kumar, editor. Gupta, Koyel Datta, editor. Dwivedi, Rinky, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003097198">https://www.taylorfrancis.com/books/9781003097198</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network forensics : privacy and security
ent://SD_ILS/0/SD_ILS:555626
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bijalwan, Anchit, author.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045908">https://www.taylorfrancis.com/books/9781003045908</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:557931
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number TK5102.94 .A44 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced cybersecurity technologies
ent://SD_ILS/0/SD_ILS:559536
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Moseley, Ralph, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003096894">https://www.taylorfrancis.com/books/9781003096894</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity for ehealth : a simplified guide to practical cybersecurity for non-technical healthcare stakeholders & practitioners
ent://SD_ILS/0/SD_ILS:566470
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Ogu, Emmanuel C., author.<br/>Preferred Shelf Number R859.7 .S43<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003254416">https://www.taylorfrancis.com/books/9781003254416</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
National security in the new world order : government and the technology of information
ent://SD_ILS/0/SD_ILS:568976
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Monti, Andrea, 1967- author. Wacks, Raymond, author.<br/>Preferred Shelf Number JF1525 .A8<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367809775">https://www.taylorfrancis.com/books/9780367809775</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices
ent://SD_ILS/0/SD_ILS:553601
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Alexandrou, Alex (Professor of information technology security), author.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optimal spending on cybersecurity measures : risk management
ent://SD_ILS/0/SD_ILS:553885
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kissoon, Tara, author.<br/>Preferred Shelf Number HF5548.37 .K57 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kendi siteni kendin koru
ent://SD_ILS/0/SD_ILS:524306
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Büyükgöze, Selma. El, Çağrı.<br/>Preferred Shelf Number TK5105.59 B898 2022<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
PCI COMPLIANCE understand and implement effective pci data security standard compliance.
ent://SD_ILS/0/SD_ILS:549842
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Williams, Branden R., author. Adamson, James K.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003100300">https://www.taylorfrancis.com/books/9781003100300</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security leader's communication playbook : bridging the gap between security and the business
ent://SD_ILS/0/SD_ILS:551869
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Brown, Jeffrey W., author.<br/>Preferred Shelf Number HD30.38 .B76 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003100294">https://www.taylorfrancis.com/books/9781003100294</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
INTERDISCIPLINARY APPROACH TO MODERN NETWORK SECURITY
ent://SD_ILS/0/SD_ILS:571220
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pramanik, Sabyasachi, 1978- Sharma, Anand. Bhatia, Surbhi, 1988- Le, Dac-Nhuong, 1983-<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003147176">https://www.taylorfrancis.com/books/9781003147176</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security awareness design in the new normal age
ent://SD_ILS/0/SD_ILS:585813
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Goucher, Wendy, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003194583">https://www.taylorfrancis.com/books/9781003194583</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practical introduction to enterprise network and security management
ent://SD_ILS/0/SD_ILS:589572
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Shin, Bongsik, author.<br/>Preferred Shelf Number TK5105.548 .S55 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003123699">https://www.taylorfrancis.com/books/9781003123699</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to the cyber ranges
ent://SD_ILS/0/SD_ILS:592470
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pandey, Bishwajeet, author. Ahmad, Shabeer (Electronics engineer), author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003206071">https://www.taylorfrancis.com/books/9781003206071</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security analytics : a data centric approach to information security
ent://SD_ILS/0/SD_ILS:592471
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Khurana, Mehak, editor. Mahajan, Shilpa, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003206088">https://www.taylorfrancis.com/books/9781003206088</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity : a practical engineering approach
ent://SD_ILS/0/SD_ILS:558400
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Santos, Henrique, 1960- author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/e/9780429286742">https://www.taylorfrancis.com/books/e/9780429286742</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advancing computational intelligence techniques for security systems design
ent://SD_ILS/0/SD_ILS:564480
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sharma, Uzzal, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003229704">https://www.taylorfrancis.com/books/9781003229704</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools
ent://SD_ILS/0/SD_ILS:568141
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Moallem, Abbas, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003038429">https://www.taylorfrancis.com/books/9781003038429</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO.
ent://SD_ILS/0/SD_ILS:568484
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Das, Ravindra, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003305309">https://www.taylorfrancis.com/books/9781003305309</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Authorization and access control : foundations, frameworks, and applications
ent://SD_ILS/0/SD_ILS:570370
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Mahalle, Parikshit N., author. Bhong, Shashikant S., author. Shinde, Gitanjali Rahul, 1983- author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003268482">https://www.taylorfrancis.com/books/9781003268482</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vehicular communications for smart cars : protocols, applications and security concerns
ent://SD_ILS/0/SD_ILS:576675
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Chowdhury, Niaz, 1984- author. Mackenzie, L. M., author.<br/>Preferred Shelf Number TE228.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315110905">https://www.taylorfrancis.com/books/9781315110905</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Creating an information security program from scratch
ent://SD_ILS/0/SD_ILS:576963
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number QA76.9 .A25 W55 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093688">https://www.taylorfrancis.com/books/9781003093688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs
ent://SD_ILS/0/SD_ILS:577899
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Chowdhury, Rajdeep, editor. Niranjan, S. K., editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity public policy : SWOT analysis conducted on 43 countries
ent://SD_ILS/0/SD_ILS:578078
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Fowler, Bradley, 1968- author. Maranga, Kennedy M., 1965- author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003259145">https://www.taylorfrancis.com/books/9781003259145</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Holistic approach to quantum cryptography in cyber security
ent://SD_ILS/0/SD_ILS:578140
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Shashi Bhushan, 1928- editor.<br/>Preferred Shelf Number QA76.9 .D335<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003296034">https://www.taylorfrancis.com/books/9781003296034</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security handbook
ent://SD_ILS/0/SD_ILS:584442
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Jhanjhi, Noor Zaman, 1972- editor. Hussain, Khalid, editor. Humayun, Mamoona, editor. Abdullah, Azween Bin, 1961- editor. Tavares, João Manuel R. S., editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367808228">https://www.taylorfrancis.com/books/9780367808228</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Security Hippie.
ent://SD_ILS/0/SD_ILS:587563
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Engel, Barak.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elektronik harp
ent://SD_ILS/0/SD_ILS:514348
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pakfiliz, Ahmet Güngör.<br/>Preferred Shelf Number UG485 P35 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Ağ yönetimi ve bilgi güvenliği
ent://SD_ILS/0/SD_ILS:516275
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bilge, Alper. Kaçmaz, Emre.<br/>Preferred Shelf Number TK5105.59 A98 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cyber-security education : principles and policies
ent://SD_ILS/0/SD_ILS:562204
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Austin, Greg, 1951- editor.<br/>Preferred Shelf Number QA76.9 .A25 C91813 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367822576">https://www.taylorfrancis.com/books/9780367822576</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control
ent://SD_ILS/0/SD_ILS:563283
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Jeyanthi, N., 1977- author. Ma, Kun (Computer scientist), author. Perumal, Thinagaran, author. Thandeeswaran, N., author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003034049">https://www.taylorfrancis.com/books/9781003034049</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURING SOCIAL NETWORKS IN CYBERSPACE
ent://SD_ILS/0/SD_ILS:566336
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003134527">https://www.taylorfrancis.com/books/9781003134527</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security architecture : how & why
ent://SD_ILS/0/SD_ILS:551177
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Madsen, Tom, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003339380">https://www.taylorfrancis.com/books/9781003339380</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY ISSUES IN EMERGING TECHNOLOGIES
ent://SD_ILS/0/SD_ILS:564291
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Maglaras, Leandros, editor. Kantzavelou, Ioanna, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003109952">https://www.taylorfrancis.com/books/9781003109952</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense mechanisms security, privacy, and challenges
ent://SD_ILS/0/SD_ILS:571884
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kumar, Gautam, 1990- Saini, Dinesh Kumar, 1974- Cuong, Nguyen Ha Huy.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367816438">https://www.taylorfrancis.com/books/9780367816438</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing security foundations and challenges
ent://SD_ILS/0/SD_ILS:580601
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CyRM? mastering the management of cybersecurity
ent://SD_ILS/0/SD_ILS:589538
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Martin, David X., author.<br/>Preferred Shelf Number HD30.38 .M37 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003098232">https://www.taylorfrancis.com/books/9781003098232</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and employee behaviour : how to reduce risk through employee education, training and awareness
ent://SD_ILS/0/SD_ILS:590294
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author McIlwraith, Angus, author.<br/>Preferred Shelf Number HD30.38<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429281785">https://www.taylorfrancis.com/books/9780429281785</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Routledge companion to global cyber-security strategy
ent://SD_ILS/0/SD_ILS:561317
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Romaniuk, Scott N., 1979- editor. Manjikian, Mary, editor.<br/>Preferred Shelf Number UA163 .R68 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429399718">https://www.taylorfrancis.com/books/9780429399718</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enterprise cybersecurity in digital business : building a cyber resilient organization
ent://SD_ILS/0/SD_ILS:591406
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Evans, Ariel, author.<br/>Preferred Shelf Number HD30.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003052616">https://www.taylorfrancis.com/books/9781003052616</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Türkiye’de ve dünyada siber güvenlik
ent://SD_ILS/0/SD_ILS:514958
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Çeliktaş, Barış .<br/>Preferred Shelf Number UG485 C45 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Uygulamalarla siber güvenliğe giriş
ent://SD_ILS/0/SD_ILS:510151
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59.A39 U94 2020<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Enterprise level security 2 advanced topics in an uncertain world
ent://SD_ILS/0/SD_ILS:552772
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Foltz, Kevin E., author. Simpson, William Randolph, 1946- author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003080787">https://www.taylorfrancis.com/books/9781003080787</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Attribute-Based Encryption and Access Control
ent://SD_ILS/0/SD_ILS:569930
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Huang, Dijiang. Dong, Qiuxiang. Zhu, Yan (Professor of computer security)<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781351210607">https://www.taylorfrancis.com/books/9781351210607</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ENTERPRISE LEVEL SECURITY 1 & 2
ent://SD_ILS/0/SD_ILS:581770
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Foltz, Kevin E. Simpson, William Randolph, 1946-<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003082118">https://www.taylorfrancis.com/books/9781003082118</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data protection ensuring data availability
ent://SD_ILS/0/SD_ILS:582517
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author De Guise, Preston.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367463496">https://www.taylorfrancis.com/books/9780367463496</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity fundamentals a real-world perspective
ent://SD_ILS/0/SD_ILS:582678
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Thakur, Kutub. Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003035626">https://www.taylorfrancis.com/books/9781003035626</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber strategy : risk-driven security and resiliency
ent://SD_ILS/0/SD_ILS:585453
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Siegel, Carol A., author. Sweeney, Mark, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429323003">https://www.taylorfrancis.com/books/9780429323003</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed denial of service attacks : real-world detection and mitigation
ent://SD_ILS/0/SD_ILS:577648
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Brooks, R. R. (Richard R.), author. Özçelik, İlker, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315213125">https://www.taylorfrancis.com/books/9781315213125</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity education for awareness and compliance
ent://SD_ILS/0/SD_ILS:482092
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Vasileiou, Ismini, 1980- editor. Furnell, Steven, 1970- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Countering cyber attacks and preserving the integrity and availability of critical systems
ent://SD_ILS/0/SD_ILS:482177
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime
ent://SD_ILS/0/SD_ILS:483013
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484846
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bassioni, Ghada. editor. Kebe, Cheikh M.F. editor. Gueye, Assane. editor. (orcid)0000-0001-6469-4716 Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484847
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Askarov, Aslan. editor. Hansen, René Rydhof. editor. Rafnsson, Willard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Siber güvenlik ve savunma : standartlar ve uygulamalar
ent://SD_ILS/0/SD_ILS:462283
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sağıroğlu, Şeref.<br/>Preferred Shelf Number TK5105.59 S53 2019<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethical hacking : (hacking kursu)
ent://SD_ILS/0/SD_ILS:423950
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberdanger Understanding and Guarding Against Cybercrime
ent://SD_ILS/0/SD_ILS:485936
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and security challenges in emerging networks
ent://SD_ILS/0/SD_ILS:481975
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483112
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Nandi, Sukumar. editor. Jinwala, Devesh. editor. Singh, Virendra. editor. Laxmi, Vijay. editor. Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483366
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483889
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Meng, Weizhi. editor. (orcid)0000-0003-4384-5786 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400107
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Exploit geliştirme 101
ent://SD_ILS/0/SD_ILS:389077
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Akyıldız, M. Alparslan.<br/>Preferred Shelf Number QA76.9.A25 A59 2018<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400186
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Chowdhury, Kaushik Roy. editor. Di Felice, Marco. editor. Matta, Ibrahim. editor. Sheng, Bo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400306
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Budaghyan, Lilya. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:459114
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Faircloth, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the internet of things
ent://SD_ILS/0/SD_ILS:459335
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safety of web applications : risks, encryption and handling vulnerabilities with PHP
ent://SD_ILS/0/SD_ILS:459467
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Quinton, Éric, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in network functions virtualization
ent://SD_ILS/0/SD_ILS:459901
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Zhang, Zonghua, author. Meddahi, Ahmed, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:459518
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of cyber safety : computer and mobile device safety made easy
ent://SD_ILS/0/SD_ILS:459044
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sammons, John, author. Cross, Michael, 1965- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Service Oriented Architectures.
ent://SD_ILS/0/SD_ILS:542633
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Williams, Walter, author. CRC Press LLC.<br/>Preferred Shelf Number TK5105.5828 .W55 2017<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:543286
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author PELTIER, THOMAS R.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429210747">https://www.taylorfrancis.com/books/9780429210747</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
ent://SD_ILS/0/SD_ILS:542757
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author VARSALONE, JESSE.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security awareness for CEOs and management
ent://SD_ILS/0/SD_ILS:458665
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:458777
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security : defending the domain name system
ent://SD_ILS/0/SD_ILS:458935
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Liska, Allan, author. Stowe, Geoffrey, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh Hour CISSP®
ent://SD_ILS/0/SD_ILS:459073
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Conrad, Eric, author. Seth Misenar, author. Joshua Feldman, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for penetration testers : building better tools
ent://SD_ILS/0/SD_ILS:459217
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Andress, Jason, author. Linn, Ryan, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:513452
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Data breach preparation and response : breaches are certain, impact is not
ent://SD_ILS/0/SD_ILS:458926
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Fowler, Kevvie, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network performance and security : testing and analyzing using open source and low-cost tools
ent://SD_ILS/0/SD_ILS:458789
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Chapman, Chris, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber guerilla
ent://SD_ILS/0/SD_ILS:458953
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing online risk : apps, mobile, and social media security
ent://SD_ILS/0/SD_ILS:355514
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355514.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance : understand and implement effective PCI data security standard compliance
ent://SD_ILS/0/SD_ILS:355363
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Williams, Branden R., author. Chuvakin, Anton A., author. Milroy, Derek, editor<br/>Preferred Shelf Number ONLINE(355363.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ağ ve yazılım güvenliği
ent://SD_ILS/0/SD_ILS:379758
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Çontar, Furkan.<br/>Preferred Shelf Number TK5105.59 C66 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Siber istihbarat
ent://SD_ILS/0/SD_ILS:384051
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Keleştemur, Atalay<br/>Preferred Shelf Number QA76.9.A25 K45 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Dissecting the hack : the v3rb0ten network
ent://SD_ILS/0/SD_ILS:458624
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tam kapsamlı sanal test laboratuvarı kurulumu ve uygulamalı sızma testleri
ent://SD_ILS/0/SD_ILS:513467
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Yalçınkaya, Mehmet Ali, yazar. Küçüksille, Ecir Uğur, yazar.<br/>Preferred Shelf Number TK5105.59 Y35 2015<br/>Format: Regular print<br/>Availability Beytepe Library~1<br/>
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
ent://SD_ILS/0/SD_ILS:458699
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Richter, Andy, author. Wood, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Case studies in secure computing : achievements and trends
ent://SD_ILS/0/SD_ILS:541687
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Issac, Biju, editor. Israr, Nauman, editor.<br/>Preferred Shelf Number QA76.9 .A25 C426 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482207071">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security
ent://SD_ILS/0/SD_ILS:342168
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking Interface
ent://SD_ILS/0/SD_ILS:317847
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Cybercrime and cyberwarfare
ent://SD_ILS/0/SD_ILS:341980
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity for executives : a practical guide
ent://SD_ILS/0/SD_ILS:341997
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
ent://SD_ILS/0/SD_ILS:355853
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data analysis for network cyber-security
ent://SD_ILS/0/SD_ILS:354757
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:355770
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:355909
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security careers skills, compensation, and career paths
ent://SD_ILS/0/SD_ILS:356043
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of digital privacy simple tools to protect your personal information and your identity online
ent://SD_ILS/0/SD_ILS:356123
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Cherry, Denny. LaRock, Thomas.<br/>Preferred Shelf Number ONLINE(356123.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:306690
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing information security
ent://SD_ILS/0/SD_ILS:306692
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Business continuity and disaster recovery planning for IT professionals
ent://SD_ILS/0/SD_ILS:306695
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Anonymous communication networks : protecting privacy on the web
ent://SD_ILS/0/SD_ILS:543619
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Peng, Kun, author.<br/>Preferred Shelf Number TK5105.59 .P463 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881606">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Network anomaly detection : a machine learning perspective
ent://SD_ILS/0/SD_ILS:547748
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bhattacharyya, Dhruba K., author. Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number TK5105.59 .B474 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466582095">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:544118
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security for multihop wireless networks
ent://SD_ILS/0/SD_ILS:538652
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Khan, Shafiullah, editor. Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number TK5105.59 .S43 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466578043">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Distributed networks : intelligence, security, and applications
ent://SD_ILS/0/SD_ILS:540452
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Memon, Qurban Ali, editor.<br/>Preferred Shelf Number QA76.9 .D5 D55626 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315216218">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Conducting network penetration and espionage in a global environment
ent://SD_ILS/0/SD_ILS:541163
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Middleton, Bruce, 1953, author.<br/>Preferred Shelf Number TK5105.59 .M53 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482206487">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:543676
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes
ent://SD_ILS/0/SD_ILS:313044
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Fadyushin, Vyacheslav.<br/>Preferred Shelf Number ONLINE(313044.1)<br/>Electronic Access Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied network security monitoring collection, detection, and analysis
ent://SD_ILS/0/SD_ILS:356122
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sanders, Chris. Smith, Jason.<br/>Preferred Shelf Number ONLINE(356122.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of web hacking tools and techniques to attack the Web
ent://SD_ILS/0/SD_ILS:306699
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information protection playbook
ent://SD_ILS/0/SD_ILS:306649
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in cyber security technology, operations, and experiences
ent://SD_ILS/0/SD_ILS:239591
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security for managers
ent://SD_ILS/0/SD_ILS:516570
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Official (ISC)[superscript 2] guide to the CAP CBK
ent://SD_ILS/0/SD_ILS:540750
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Howard, Patrick D., author.<br/>Preferred Shelf Number TK5105.59 .H673 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439820766">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Responsive Security
ent://SD_ILS/0/SD_ILS:542438
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kang, Meng-Chow, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Iris biometric model for secured network access
ent://SD_ILS/0/SD_ILS:546623
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Khoury, Franjieh El., author.<br/>Preferred Shelf Number TK7882 .B56 K46 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502147">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:547855
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number TK5105.59 .H3532 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
FISMA and the risk management framework the new practice of federal cyber security
ent://SD_ILS/0/SD_ILS:145936
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Gantz, Stephen D. Philpott, Daniel R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
UTM security with Fortinet Mastering FortiOS
ent://SD_ILS/0/SD_ILS:146934
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Tam, Kenneth.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automatic defense against zero-day polymorphic worms in communication networks
ent://SD_ILS/0/SD_ILS:539715
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Mohammed, Mohssen, 1982, author. Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number QA76.76 .C68 M64 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466557284">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security metrics a beginner's guide
ent://SD_ILS/0/SD_ILS:293238
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the clicks network security in the age of social media
ent://SD_ILS/0/SD_ILS:293240
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle WebLogic server 11g administration handbook
ent://SD_ILS/0/SD_ILS:293243
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Alapati, Sam R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:276700
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Robust control system networks how to achieve reliable control after Stuxnet
ent://SD_ILS/0/SD_ILS:280181
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Langner, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Operating systems demystified
ent://SD_ILS/0/SD_ILS:294101
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:241837
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and application security fundamentals and practices
ent://SD_ILS/0/SD_ILS:541627
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Ganguly, Debashis., author. Lahiri, Shibamouli.<br/>Preferred Shelf Number TK5105.59 .G36 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Data mining tools for malware detection
ent://SD_ILS/0/SD_ILS:545796
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Masud, Mehedy., author. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Preferred Shelf Number QA76.9 .D343 M385 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439854556">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
ent://SD_ILS/0/SD_ILS:146274
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent threat understanding the danger and how to protect your organization
ent://SD_ILS/0/SD_ILS:146056
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance
ent://SD_ILS/0/SD_ILS:148429
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Chuvakin, Anton. Williams, Branden R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148516
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CISSP study guide
ent://SD_ILS/0/SD_ILS:148769
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
ent://SD_ILS/0/SD_ILS:145254
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook on securing cyber-physical critical infrastructure
ent://SD_ILS/0/SD_ILS:145579
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
ent://SD_ILS/0/SD_ILS:145689
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Client-side attacks and defense
ent://SD_ILS/0/SD_ILS:148731
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Oriyano, Sean-Philip. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits
ent://SD_ILS/0/SD_ILS:545161
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T56 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439880289">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Asset protection through security awareness
ent://SD_ILS/0/SD_ILS:546687
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Speed, Tyler Justin., author.<br/>Preferred Shelf Number TK5105.59 .S643 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439809839">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cybersecurity : public sector threats and responses
ent://SD_ILS/0/SD_ILS:545406
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Andreasson, Kim J.<br/>Preferred Shelf Number TK5105.59 .C927 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439846643">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Readings and cases in information security : law and ethics
ent://SD_ILS/0/SD_ILS:267743
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Whitman, Michael E. Mattord, Herbert J.<br/>Preferred Shelf Number TK5105.878 W54 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:271446
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S782 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security firewalls and VPNs
ent://SD_ILS/0/SD_ILS:271452
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Stewart, James Michael.<br/>Preferred Shelf Number TK5105.59 S758 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing an IAM framework with Oracle identity and access management suite
ent://SD_ILS/0/SD_ILS:293289
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac OS X system administration
ent://SD_ILS/0/SD_ILS:293298
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile application security
ent://SD_ILS/0/SD_ILS:293312
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Networking a beginner's guide
ent://SD_ILS/0/SD_ILS:293314
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco ASA configuration
ent://SD_ILS/0/SD_ILS:293322
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Deal, Richard A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fedora 7 & Red Hat Enterprise Linux the complete reference
ent://SD_ILS/0/SD_ILS:293328
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Petersen, Richard, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows server 2008 the complete reference
ent://SD_ILS/0/SD_ILS:293367
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Ruest, Danielle. Ruest, Nelson.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows server 2008 a beginner's guide
ent://SD_ILS/0/SD_ILS:293368
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Citrix Access Suite 4 advanced concepts the official guide
ent://SD_ILS/0/SD_ILS:293372
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kaplan, Steve, 1955- Jones, Andy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CNET do-it-yourself home networking projects 24 cool things you didn't know you could do!
ent://SD_ILS/0/SD_ILS:293687
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Aspinwall, Jim. CNET (Firm)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:386241
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kahate, Atul.<br/>Preferred Shelf Number TK5105.59 K12 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Home networking demystified a self-teaching guide
ent://SD_ILS/0/SD_ILS:294143
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Long, Larry E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:303838
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wars of disruption and resilience cybered conflict, power, and national security
ent://SD_ILS/0/SD_ILS:244312
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Liu, Lei, 1968, author.<br/>Preferred Shelf Number QA76.9 .A25 L587 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Practical risk management for the CIO
ent://SD_ILS/0/SD_ILS:541595
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Scherling, Mark., author.<br/>Preferred Shelf Number HF5548.37 .S34 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cyber warfare techniques, tactics and tools for security practitioners
ent://SD_ILS/0/SD_ILS:147479
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Andress, Jason. Winterfeld, Steve. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the cloud cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:148980
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for penetration testers building better tools
ent://SD_ILS/0/SD_ILS:148785
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Andress, Jason. Linn, Ryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ninja hacking unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:146263
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Wilhelm, Thomas. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour CISSP study guide
ent://SD_ILS/0/SD_ILS:146597
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:148225
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Faircloth, Jeremy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the SSCP CBK
ent://SD_ILS/0/SD_ILS:543369
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number QA76.3 .O3845 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439804841">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secure semantic service-oriented systems
ent://SD_ILS/0/SD_ILS:540399
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number TK5105.5828 .T48 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420073324">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T55 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security of self-organizing networks : MANET, WSN, WMN, VANET
ent://SD_ILS/0/SD_ILS:544711
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number TK5105.77 .S43 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439819203">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
China's cyberwarfare capability
ent://SD_ILS/0/SD_ILS:281481
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Marvel, Elisabette M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:306328
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cognitive Radio Networking and Security A Game-Theoretic View
ent://SD_ILS/0/SD_ILS:238948
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Liu, K. J. Ray. Wang, Beibei.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security A Decision and Game-Theoretic Approach
ent://SD_ILS/0/SD_ILS:237887
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Alpcan, Tansu. Başar, Tamer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of financial cryptography and security
ent://SD_ILS/0/SD_ILS:542098
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Rosenberg, Burton.<br/>Preferred Shelf Number HG1710 .H34 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:148953
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest network attacks
ent://SD_ILS/0/SD_ILS:149185
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Prowell, Stacy J. Kraus, Rob. Borkin, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour network+ exam N10-004 study guide
ent://SD_ILS/0/SD_ILS:146455
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Alpern, Naomi J. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance.
ent://SD_ILS/0/SD_ILS:148342
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Chuvakin, Anton. Williams, Branden R. Spangenberg, Ward.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:149103
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2026-01-11T22:30:28Z
2026-01-11T22:30:28Z
Author Haines, Brad.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>