Search Results for Data protection. - Narrowed by: 2008 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ps$003d300?dt=list 2024-11-27T14:43:37Z Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289734 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Der IT Security Manager Expertenwissen f&uuml;r jeden IT Security Manager &mdash; Von namhaften Autoren praxisnah vermittelt ent://SD_ILS/0/SD_ILS:199370 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Kersten, Heinrich. author.&#160;Klett, Gerhard. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9239-3">http://dx.doi.org/10.1007/978-3-8348-9239-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185381 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185647 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Bellovin, Steven M. editor.&#160;Gennaro, Rosario. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dependability Metrics Advanced Lectures ent://SD_ILS/0/SD_ILS:185660 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Eusgeld, Irene. editor.&#160;Freiling, Felix C. editor.&#160;Reussner, Ralf. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68947-8">http://dx.doi.org/10.1007/978-3-540-68947-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185674 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Lipp, Peter. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Koch, Klaus-Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security III ent://SD_ILS/0/SD_ILS:185689 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Shi, Yun Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185771 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Rong, Chunming. editor.&#160;Jaatun, Martin Gilje. editor.&#160;Sandnes, Frode Eika. editor.&#160;Yang, Laurence T. editor.&#160;Ma, Jianhua. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185814 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Jahankhani, Hamid. editor.&#160;Revett, Kenneth. editor.&#160;Palmer-Brown, Dominic. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185962 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Mu, Yi. editor.&#160;Susilo, Willy. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185981 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Zamboni, Diego. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185991 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Atluri, Vijay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:186015 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Borisov, Nikita. editor.&#160;Goldberg, Ian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Set&uacute;bal, Portugal, August 7-10, 2006. Selected Papers ent://SD_ILS/0/SD_ILS:186034 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pervasive Computing 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188485 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Indulska, Jadwiga. editor.&#160;Patterson, Donald J. editor.&#160;Rodden, Tom. editor.&#160;Ott, Max. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79576-6">http://dx.doi.org/10.1007/978-3-540-79576-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188543 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Onieva, Jose A. editor.&#160;Sauveron, Damien. editor.&#160;Chaumette, Serge. editor.&#160;Gollmann, Dieter. editor.&#160;Markantonakis, Konstantinos. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188570 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Oswald, Elisabeth. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188894 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Harrison, Michael D. editor.&#160;Sujan, Mark-Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network-Based Information Systems 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188752 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Takizawa, Makoto. editor.&#160;Barolli, Leonard. editor.&#160;Enokido, Tomoya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85693-1">http://dx.doi.org/10.1007/978-3-540-85693-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188765 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Furnell, Steven. editor.&#160;Katsikas, Sokratis K. editor.&#160;Lioy, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189090 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Chen, Liqun. editor.&#160;Ryan, Mark D. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189113 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Baek, Joonsang. editor.&#160;Bao, Feng. editor.&#160;Chen, Kefei. editor.&#160;Lai, Xuejia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88733-1">http://dx.doi.org/10.1007/978-3-540-88733-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:189212 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Lopez, Javier. editor.&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189234 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Pieprzyk, Josef. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Networking. Towards Ubiquitous Networking and Services International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189281 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Vaz&atilde;o, Teresa. editor.&#160;Freire, M&aacute;rio M. editor.&#160;Chong, Ilyoung. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89524-4">http://dx.doi.org/10.1007/978-3-540-89524-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189294 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Matsuura, Kanta. editor.&#160;Fujisaki, Eiichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189329 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Chowdhury, Dipanwita Roy. editor.&#160;Rijmen, Vincent. editor.&#160;Das, Abhijit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189347 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Sekar, R. editor.&#160;Pujari, Arun K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Profikurs Sicherheit von Web-Servern Ein praxisorientiertes Handbuch &mdash; Grundlagen, Aufbau und Architektur &mdash; Schwachstellen und Hintert&uuml;ren &mdash; Konkrete Praxisbeispiele realisiert unter Windows und Unix/Linux ent://SD_ILS/0/SD_ILS:199588 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Hockmann, Volker. author.&#160;Kn&ouml;ll, Heinz-Dieter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9471-7">http://dx.doi.org/10.1007/978-3-8348-9471-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kryptographie und IT-Sicherheit Grundlagen und Anwendungen ent://SD_ILS/0/SD_ILS:199590 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Swoboda, Joachim. author.&#160;Spitz, Stephan. author.&#160;Pramateftakis, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9473-1">http://dx.doi.org/10.1007/978-3-8348-9473-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communications 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185594 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Harju, Jarmo. editor.&#160;Heijenk, Geert. editor.&#160;Langend&ouml;rfer, Peter. editor.&#160;Siris, Vasilios A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68807-5">http://dx.doi.org/10.1007/978-3-540-68807-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ubiquitous Intelligence and Computing 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:185770 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Sandnes, Frode Eika. editor.&#160;Zhang, Yan. editor.&#160;Rong, Chunming. editor.&#160;Yang, Laurence T. editor.&#160;Ma, Jianhua. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69293-5">http://dx.doi.org/10.1007/978-3-540-69293-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Systeme Konzepte und Anforderungen ent://SD_ILS/0/SD_ILS:187607 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;M&uuml;ller, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-76410-6">http://dx.doi.org/10.1007/978-3-540-76410-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:187874 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Rao, Shrisha. editor.&#160;Chatterjee, Mainak. editor.&#160;Jayanti, Prasad. editor.&#160;Murthy, C. Siva Ram. editor.&#160;Saha, Sanjoy Kumar. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77444-0">http://dx.doi.org/10.1007/978-3-540-77444-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:188204 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Barthe, Gilles. editor.&#160;Fournet, C&eacute;dric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78663-4">http://dx.doi.org/10.1007/978-3-540-78663-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2008 The Cryptographers&rsquo; Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188378 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Malkin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188588 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188792 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Ostrovsky, Rafail. editor.&#160;Prisco, Roberto. editor.&#160;Visconti, Ivan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188801 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Wu, Tzong-Chen. editor.&#160;Lei, Chin-Laung. editor.&#160;Rijmen, Vincent. editor.&#160;Lee, Der-Tsai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188803 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Grimaud, Gilles. editor.&#160;Standaert, Fran&ccedil;ois-Xavier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188832 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Akar, Nail. editor.&#160;Pioro, Michal. editor.&#160;Skianis, Charalabos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188841 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Lippmann, Richard. editor.&#160;Kirda, Engin. editor.&#160;Trachtenberg, Ari. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2008 OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part I ent://SD_ILS/0/SD_ILS:189151 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Meersman, Robert. editor.&#160;Tari, Zahir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88871-0">http://dx.doi.org/10.1007/978-3-540-88871-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2008 OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II ent://SD_ILS/0/SD_ILS:189152 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Meersman, Robert. editor.&#160;Tari, Zahir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88873-4">http://dx.doi.org/10.1007/978-3-540-88873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189164 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Solanki, Kaushal. editor.&#160;Sullivan, Kenneth. editor.&#160;Madhow, Upamanyu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188292 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Smart, Nigel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:188336 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Chen, Liqun. editor.&#160;Mu, Yi. editor.&#160;Susilo, Willy. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:188456 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Pei, Dingyi. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;Wu, Chuankun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188624 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Wagner, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:188645 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:189035 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Lucks, Stefan. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Wolf, Christopher. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88353-1">http://dx.doi.org/10.1007/978-3-540-88353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189044 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Buchmann, Johannes. editor.&#160;Ding, Jintai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ambient Intelligence European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189298 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Aarts, Emile. editor.&#160;Crowley, James L. editor.&#160;Ruyter, Boris. editor.&#160;Gerh&auml;user, Heinz. editor.&#160;Pflaum, Alexander. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89617-3">http://dx.doi.org/10.1007/978-3-540-89617-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189304 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Franklin, Matthew K. editor.&#160;Hui, Lucas Chi Kwong. editor.&#160;Wong, Duncan S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global privacy protection : the first generation ent://SD_ILS/0/SD_ILS:134923 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Rule, James B., 1943-&#160;Greenleaf, G. W. (Graham William)<br/>Preferred Shelf Number&#160;K3264.C65 G58 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Privacy-Preserving Data Mining Models and Algorithms ent://SD_ILS/0/SD_ILS:166794 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Aggarwal, Charu C. editor.&#160;Yu, Philip S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Database Security Applications and Trends ent://SD_ILS/0/SD_ILS:166409 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Gertz, Michael. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptanalytic Attacks on RSA ent://SD_ILS/0/SD_ILS:166422 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:166922 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Mayes, Keith E. author.&#160;Markantonakis, Konstantinos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:166945 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Traynor, Patrick. author.&#160;McDaniel, Patrick. author.&#160;Porta, Thomas La. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:167162 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Singh, Abhishek. editor.&#160;Singh, Baibhav. editor.&#160;Joseph, Hirosh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:167451 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Mancini, Luigi V. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:167459 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Stolfo, Salvatore J. editor.&#160;Bellovin, Steven M. editor.&#160;Keromytis, Angelos D. editor.&#160;Hershkop, Shlomo. editor.&#160;Smith, Sean W. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24&ndash;16, 2008, Tokyo, Japan ent://SD_ILS/0/SD_ILS:167788 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Oya, Makoto. editor.&#160;Uda, Ryuya. editor.&#160;Yasunobu, Chizuko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188159 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Internet of Things First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188222 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Floerkemeier, Christian. editor.&#160;Langheinrich, Marc. editor.&#160;Fleisch, Elgar. editor.&#160;Mattern, Friedemann. editor.&#160;Sarma, Sanjay E. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78731-0">http://dx.doi.org/10.1007/978-3-540-78731-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Clark, Champ, III.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:164638 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Karabulut, Y&uuml;cel. editor.&#160;Mitchell, John. editor.&#160;Herrmann, Peter. editor.&#160;Jensen, Christian Damsgaard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:164757 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:166626 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Lee, Wenke. editor.&#160;Wang, Cliff. editor.&#160;Dagon, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Processing and Protection ent://SD_ILS/0/SD_ILS:167026 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Saeed, Khalid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia content encryption techniques and applications ent://SD_ILS/0/SD_ILS:285952 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Lian, Shiguo.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420065282">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Vol. 2 ent://SD_ILS/0/SD_ILS:286816 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420067101">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:291123 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Willett, Keith D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology law ent://SD_ILS/0/SD_ILS:134669 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Lloyd, Ian J.<br/>Preferred Shelf Number&#160;KD667.C65 L58 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:146277 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Kanclirz, Jan.&#160;Baskin, Brian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:146474 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Cox, I. J. (Ingemar J.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing catastrophic loss of sensitive data a guide for IT and security professionals ent://SD_ILS/0/SD_ILS:147856 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Photopoulos, Constantine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492393">http://www.sciencedirect.com/science/book/9781597492393</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The IT/digital legal companion a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms ent://SD_ILS/0/SD_ILS:147864 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;Landy, Gene K.&#160;Mastrobattista, Amy J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492560">http://www.sciencedirect.com/science/book/9781597492560</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integration of information for environmental security : environmental security, information security, disaster forecast and prevention, water resources management ent://SD_ILS/0/SD_ILS:113618 2024-11-27T14:43:37Z 2024-11-27T14:43:37Z Author&#160;NATO Advanced Research Workshop on Integration of Information for Environmental Security (2006 : Istanbul, Turkey)&#160;Coskun, H. Gonca.&#160;Cigizoglu, H. Kerem.&#160;Maktav, M. Derya.<br/>Preferred Shelf Number&#160;TD170.2 .N38 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>