Search Results for Data protection. - Narrowed by: Online Library - 2007 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026ps$003d300$0026isd$003dtrue?dt=list 2024-07-19T19:05:03Z Digital data integrity the evolution from passive protection to active management ent://SD_ILS/0/SD_ILS:296732 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Little, David B.&#160;Farmer, Skip.&#160;El-Hilali, Oussama.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=20460">http://www.books24x7.com/marc.asp?bookid=20460</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470035184">http://dx.doi.org/10.1002/9780470035184</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=83896&ref=toc">http://www.myilibrary.com?id=83896&ref=toc</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289734 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:184773 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Chakrabarti, Anirban. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern ent://SD_ILS/0/SD_ILS:185059 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Meier, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-48258-1">http://dx.doi.org/10.1007/978-3-540-48258-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:185185 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Trust in Modern Data Management ent://SD_ILS/0/SD_ILS:185914 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Petkovi&#263;, Milan. editor.&#160;Jonker, Willem. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186573 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Naor, Moni. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communications 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186625 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Boavida, Fernando. editor.&#160;Monteiro, Edmundo. editor.&#160;Mascolo, Saverio. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72697-5">http://dx.doi.org/10.1007/978-3-540-72697-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186640 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Katz, Jonathan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network-Based Information Systems First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187200 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Enokido, Tomoya. editor.&#160;Barolli, Leonard. editor.&#160;Takizawa, Makoto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74573-0">http://dx.doi.org/10.1007/978-3-540-74573-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers ent://SD_ILS/0/SD_ILS:187061 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Camenisch, Jan L. editor.&#160;Collberg, Christian S. editor.&#160;Johnson, Neil F. editor.&#160;Sallee, Phil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187068 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Menezes, Alfred. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AC power systems handbook ent://SD_ILS/0/SD_ILS:286601 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Whitaker, Jerry C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420005813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:145876 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Taylor, Laura.&#160;Shepherd, Matthew.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186107 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Vadhan, Salil P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:186175 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Lee, Jae Kwang. editor.&#160;Yi, Okyeon. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anti-Spam Measures Analysis and Design ent://SD_ILS/0/SD_ILS:186358 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Schryen, Guido. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186437 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;LaMarca, Anthony. editor.&#160;Langheinrich, Marc. editor.&#160;Truong, Khai N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72037-9">http://dx.doi.org/10.1007/978-3-540-72037-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186461 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Dawson, Ed. editor.&#160;Wong, Duncan S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186513 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Sauveron, Damien. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Bilas, Angelos. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186798 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Stajano, Frank. editor.&#160;Meadows, Catherine. editor.&#160;Capkun, Srdjan. editor.&#160;Moore, Tyler. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186859 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Pieprzyk, Josef. editor.&#160;Ghodosi, Hossein. editor.&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187146 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Lambrinoudakis, Costas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;Tjoa, A Min. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> UbiComp 2007: Ubiquitous Computing 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187289 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Krumm, John. editor.&#160;Abowd, Gregory D. editor.&#160;Seneviratne, Aruna. editor.&#160;Strang, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74853-3">http://dx.doi.org/10.1007/978-3-540-74853-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dependable Computing Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187389 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Bondavalli, Andrea. editor.&#160;Brasileiro, Francisco. editor.&#160;Rajsbaum, Sergio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75294-3">http://dx.doi.org/10.1007/978-3-540-75294-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187392 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Montanari, Ugo. editor.&#160;Sannella, Donald. editor.&#160;Bruni, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75336-0">http://dx.doi.org/10.1007/978-3-540-75336-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers ent://SD_ILS/0/SD_ILS:187446 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Borisov, Nikita. editor.&#160;Golle, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187467 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Miyaji, Atsuko. editor.&#160;Kikuchi, Hiroaki. editor.&#160;Rannenberg, Kai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:187555 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Filipe, Joaquim. editor.&#160;Coelhas, Helder. editor.&#160;Saramago, Monica. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187827 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Galbraith, Steven D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187851 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Adams, Carlisle. editor.&#160;Miri, Ali. editor.&#160;Wiener, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:187854 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Dietrich, Sven. editor.&#160;Dhamija, Rachna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187856 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Furon, Teddy. editor.&#160;Cayre, Fran&ccedil;ois. editor.&#160;Do&euml;rr, Gwena&euml;l. editor.&#160;Bas, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security II ent://SD_ILS/0/SD_ILS:186739 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186886 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Barker, Steve. editor.&#160;Ahn, Gail-Joon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186890 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Xiao, Bin. editor.&#160;Yang, Laurence T. editor.&#160;Ma, Jianhua. editor.&#160;Muller-Schloer, Christian. editor.&#160;Hua, Yu. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ubiquitous Intelligence and Computing 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186891 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Indulska, Jadwiga. editor.&#160;Ma, Jianhua. editor.&#160;Yang, Laurence T. editor.&#160;Ungerer, Theo. editor.&#160;Cao, Jiannong. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73549-6">http://dx.doi.org/10.1007/978-3-540-73549-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:186912 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;H&auml;mmerli, Bernhard. editor.&#160;Sommer, Robin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13&ndash;15, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187023 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:187165 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Biham, Eli. editor.&#160;Youssef, Amr M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187473 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Susilo, Willy. editor.&#160;Liu, Joseph K. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San Jos&eacute;, CA, USA, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187477 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Clemm, Alexander. editor.&#160;Granville, Lisandro Zambenedetti. editor.&#160;Stadler, Rolf. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187681 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Nam, Kil-Hyun. editor.&#160;Rhee, Gwangsoo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II ent://SD_ILS/0/SD_ILS:187699 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Meersman, Robert. editor.&#160;Tari, Zahir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76843-2">http://dx.doi.org/10.1007/978-3-540-76843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part I ent://SD_ILS/0/SD_ILS:187701 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Meersman, Robert. editor.&#160;Tari, Zahir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76848-7">http://dx.doi.org/10.1007/978-3-540-76848-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187720 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187727 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Cervesato, Iliano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187744 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Bao, Feng. editor.&#160;Ling, San. editor.&#160;Okamoto, Tatsuaki. editor.&#160;Wang, Huaxiong. editor.&#160;Xing, Chaoping. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187766 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Zhang, Hongke. editor.&#160;Olariu, Stephan. editor.&#160;Cao, Jiannong. editor.&#160;Johnson, David B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187767 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Srinathan, K. editor.&#160;Rangan, C. Pandu. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187773 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Qing, Sihan. editor.&#160;Imai, Hideki. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187790 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;McDaniel, Patrick. editor.&#160;Gupta, Shyam K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187809 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187892 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Alkassar, Ammar. editor.&#160;Volkamer, Melanie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187896 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Okada, Mitsu. editor.&#160;Satoh, Ichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:187904 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Kim, Sehun. editor.&#160;Yung, Moti. editor.&#160;Lee, Hyung-Woo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Power Analysis Attacks Revealing the Secrets of Smart Cards ent://SD_ILS/0/SD_ILS:166230 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Mangard, Stefan. author.&#160;Oswald, Elisabeth. author.&#160;Popp, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:166379 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Resilience and Protection ent://SD_ILS/0/SD_ILS:166891 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Hyslop, Maitland. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71862-0">http://dx.doi.org/10.1007/978-0-387-71862-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA ent://SD_ILS/0/SD_ILS:167038 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Futcher, Lynn. editor.&#160;Dodge, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance implementing effective PCI data security standards ent://SD_ILS/0/SD_ILS:148195 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Bradley, Tony, 1969-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:166560 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Flegel, Ulrich. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Identity Theft: Avoidance, Causes and Possible Cures ent://SD_ILS/0/SD_ILS:166606 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Camp, L. Jean. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Online Business Security Systems ent://SD_ILS/0/SD_ILS:166641 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Williams, Godfried B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14&ndash;16 May 2007, Sandton, South Africa ent://SD_ILS/0/SD_ILS:166940 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Venter, Hein. editor.&#160;Eloff, Mariki. editor.&#160;Labuschagne, Les. editor.&#160;Eloff, Jan. editor.&#160;Solms, Rossouw. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30&ndash; August 2, 2007, New Brunswick, Canada ent://SD_ILS/0/SD_ILS:167072 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Etalle, Sandro. editor.&#160;Marsh, Stephen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73655-6">http://dx.doi.org/10.1007/978-0-387-73655-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:285161 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Layton, Timothy P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:112169 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Taylor, Laura.&#160;Shepherd, Matthew.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance implementing effective PCI data security standards ent://SD_ILS/0/SD_ILS:112189 2024-07-19T19:05:03Z 2024-07-19T19:05:03Z Author&#160;Bradley, Tony, 1969-&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>