Search Results for Data processing - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-10-01T11:26:01Z Effectiveness of personal data protection : automated processing of criminal justice management ent://SD_ILS/0/SD_ILS:135228 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Matjas, Tatjana.<br/>Preferred Shelf Number&#160;K3264.C65 M38 2009<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483477 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Visual Informatics 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19&ndash;21, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483526 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Badioze Zaman, Halimah. editor.&#160;Smeaton, Alan F. editor.&#160;Shih, Timothy K. editor.&#160;Velastin, Sergio. editor.&#160;Terutoshi, Tada. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34032-2">https://doi.org/10.1007/978-3-030-34032-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484192 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Berlingerio, Michele. editor.&#160;Bonchi, Francesco. editor.&#160;G&auml;rtner, Thomas. editor.&#160;Hurley, Neil. editor. (orcid)0000-0001-8428-2866&#160;Ifrim, Georgiana. editor. (orcid)0000-0002-8400-2972<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10928-8">https://doi.org/10.1007/978-3-030-10928-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7&ndash;9, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484218 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Bebis, George. editor.&#160;Boyle, Richard. editor.&#160;Parvin, Bahram. editor.&#160;Koracin, Darko. editor.&#160;Ushizima, Daniela. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-33723-0">https://doi.org/10.1007/978-3-030-33723-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484509 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Garg, Deepak. editor. (orcid)0000-0002-0888-3093&#160;Kumar, N. V. Narendra. editor.&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7&ndash;9, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484820 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Bebis, George. editor.&#160;Boyle, Richard. editor.&#160;Parvin, Bahram. editor.&#160;Koracin, Darko. editor.&#160;Ushizima, Daniela. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-33720-9">https://doi.org/10.1007/978-3-030-33720-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486725 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Berlingerio, Michele. editor.&#160;Bonchi, Francesco. editor.&#160;G&auml;rtner, Thomas. editor.&#160;Hurley, Neil. editor. (orcid)0000-0001-8428-2866&#160;Ifrim, Georgiana. editor. (orcid)0000-0002-8400-2972<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10925-7">https://doi.org/10.1007/978-3-030-10925-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems: Research, Development, Applications, Education 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487038 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Wrycza, Stanis&#322;aw. editor. (orcid)0000-0001-7699-6631&#160;Ma&#347;lankowski, Jacek. editor. (orcid)0000-0003-0357-2736&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29608-7">https://doi.org/10.1007/978-3-030-29608-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402007 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Gal-Oz, Nurit. editor.&#160;Lewis, Peter R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11&ndash;12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402401 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;M. F. Kebe, Cheikh. editor.&#160;Gueye, Assane. editor.&#160;Ndiaye, Ababacar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334746.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334292 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Pillai, Prashant. editor.&#160;Shorey, Rajeev. editor.&#160;Ferro, Erina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334292.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36787-8">http://dx.doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334620 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Youssef, Amr. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Hassanien, Aboul Ella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334620.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334863.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2013 Conferences Confederated International Conferences: CoopIS, DOA-Trusted Cloud, and ODBASE 2013, Graz, Austria, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335044 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Meersman, Robert. editor.&#160;Panetto, Herv&eacute;. editor.&#160;Dillon, Tharam. editor.&#160;Eder, Johann. editor.&#160;Bellahsene, Zohra. editor.<br/>Preferred Shelf Number&#160;ONLINE(335044.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41030-7">http://dx.doi.org/10.1007/978-3-642-41030-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334132.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334720.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335063 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335073 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Felici, Massimo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335073.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41205-9">http://dx.doi.org/10.1007/978-3-642-41205-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335077 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Susilo, Willy. editor.&#160;Reyhanitabar, Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335077.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Cryptology 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197481 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Armknecht, Frederik. editor.&#160;Lucks, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34159-5">http://dx.doi.org/10.1007/978-3-642-34159-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Financial and Medical Identity Theft ent://SD_ILS/0/SD_ILS:174049 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Camp, L. Jean. author.&#160;Johnson, M. Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1918-1">http://dx.doi.org/10.1007/978-1-4614-1918-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding High-Dimensional Spaces ent://SD_ILS/0/SD_ILS:197368 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Skillicorn, David B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33398-9">http://dx.doi.org/10.1007/978-3-642-33398-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197580 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Lei, Jingsheng. editor.&#160;Wang, Fu Lee. editor.&#160;Li, Mo. editor.&#160;Luo, Yuan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modeling Decisions for Artificial Intelligence 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197533 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Torra, Vicen&ccedil;. editor.&#160;Narukawa, Yasuo. editor.&#160;L&oacute;pez, Beatriz. editor.&#160;Villaret, Mateu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34620-0">http://dx.doi.org/10.1007/978-3-642-34620-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197328 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Aschenbruck, Nils. editor.&#160;Martini, Peter. editor.&#160;Meier, Michael. editor.&#160;T&ouml;lle, Jens. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33161-9">http://dx.doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Degunking Windows 7 ent://SD_ILS/0/SD_ILS:293431 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Ballew, Joli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/degunking-windows-7">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:195111 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Qi, Luo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22706-6">http://dx.doi.org/10.1007/978-3-642-22706-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:288890 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle RMAN 11g backup and recovery ent://SD_ILS/0/SD_ILS:293308 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Freeman, Robert G., 1965-&#160;Hart, Matthew.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-rman-11g-backup-recovery">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategy from requirements to reality ent://SD_ILS/0/SD_ILS:288851 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Stackpole, Bill.&#160;Oksendahl, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transparent User Authentication Biometrics, RFID and Behavioural Profiling ent://SD_ILS/0/SD_ILS:168600 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Clarke, Nathan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-805-8">http://dx.doi.org/10.1007/978-0-85729-805-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems - CHES 2009 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190848 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Clavier, Christophe. editor.&#160;Gaj, Kris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04138-9">http://dx.doi.org/10.1007/978-3-642-04138-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191012 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Pieprzyk, Josef. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04642-1">http://dx.doi.org/10.1007/978-3-642-04642-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191273 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Jacobson, Michael J. editor.&#160;Rijmen, Vincent. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191500 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Parker, Matthew G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:288744 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Collette, Ronald D.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings ent://SD_ILS/0/SD_ILS:190785 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Markowitch, Olivier. editor.&#160;Bilas, Angelos. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Mitchell, Chris J. editor.&#160;Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190855 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Avanzi, Roberto Maria. editor.&#160;Keliher, Liam. editor.&#160;Sica, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189035 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Lucks, Stefan. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Wolf, Christopher. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88353-1">http://dx.doi.org/10.1007/978-3-540-88353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189113 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Baek, Joonsang. editor.&#160;Bao, Feng. editor.&#160;Chen, Kefei. editor.&#160;Lai, Xuejia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Layton, Timothy P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital data integrity the evolution from passive protection to active management ent://SD_ILS/0/SD_ILS:296732 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Little, David B.&#160;Farmer, Skip.&#160;El-Hilali, Oussama.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=20460">http://www.books24x7.com/marc.asp?bookid=20460</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470035184">http://dx.doi.org/10.1002/9780470035184</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=83896&ref=toc">http://www.myilibrary.com?id=83896&ref=toc</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital rights management : an introduction ent://SD_ILS/0/SD_ILS:365587 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Satish, D., 1977-<br/>Preferred Shelf Number&#160;KK2655.6 D54 2007<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:284790 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO handbook a practical guide to securing your company ent://SD_ILS/0/SD_ILS:290416 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Gentile, Michael.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:288306 2024-10-01T11:26:01Z 2024-10-01T11:26:01Z Author&#160;Kairab, Sudhanshu.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>