Search Results for Data protection. - Narrowed by: 2011
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026ps$003d300$0026isd$003dtrue?
2024-11-07T01:11:33Z
Computers, Privacy and Data Protection: an Element of Choice
ent://SD_ILS/0/SD_ILS:205901
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Gutwirth, Serge. editor. Poullet, Yves. editor. De Hert, Paul. editor. Leenes, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-94-007-0641-5">http://dx.doi.org/10.1007/978-94-007-0641-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:289151
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:290320
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:287123
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:290763
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Systems Safety Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, UK, 8-10th February 2011
ent://SD_ILS/0/SD_ILS:168431
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Dale, Chris. editor. Anderson, Tom. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-133-2">http://dx.doi.org/10.1007/978-0-85729-133-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
ent://SD_ILS/0/SD_ILS:173331
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Keromytis, Angelos D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9866-8">http://dx.doi.org/10.1007/978-1-4419-9866-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence Management Knowledge Driven Frameworks for Combating Terrorism and Organized Crime
ent://SD_ILS/0/SD_ILS:173369
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Akhgar, Babak. editor. Yates, Simeon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-2140-4">http://dx.doi.org/10.1007/978-1-4471-2140-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats
ent://SD_ILS/0/SD_ILS:173823
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Swarup, Vipin. editor. Wang, Cliff. editor. Wang, X. Sean. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193975
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Camenisch, Jan. editor. Kisimov, Valentin. editor. Dubovitskaya, Maria. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19228-9">http://dx.doi.org/10.1007/978-3-642-19228-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Cryptography – PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194024
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Catalano, Dario. editor. Fazio, Nelly. editor. Gennaro, Rosario. editor. Nicolosi, Antonio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Research on Electronic Commerce, Web Application, and Communication International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 2011. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:194345
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Shen, Gang. editor. Huang, Xiong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20367-1">http://dx.doi.org/10.1007/978-3-642-20367-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194466
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Fehr, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – AFRICACRYPT 2011 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194876
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Nitaj, Abderrahmane. editor. Pointcheval, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21969-6">http://dx.doi.org/10.1007/978-3-642-21969-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and Trust Computing, Data Management and Applications 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194993
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Park, James J. editor. Lopez, Javier. editor. Yeo, Sang-Soo. editor. Shon, Taeshik. editor. Taniar, David. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22339-6">http://dx.doi.org/10.1007/978-3-642-22339-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194997
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Li, Yingjiu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22348-8">http://dx.doi.org/10.1007/978-3-642-22348-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195578
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security VI
ent://SD_ILS/0/SD_ILS:195673
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Shi, Yun Q. editor. Emmanuel, Sabu. editor. Kankanhalli, Mohan S. editor. Chang, Shih-Fu. editor. Radhakrishnan, Regunathan. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24556-5">http://dx.doi.org/10.1007/978-3-642-24556-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195683
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195900
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Baras, John S. editor. Katz, Jonathan. editor. Altman, Eitan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25280-8">http://dx.doi.org/10.1007/978-3-642-25280-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Systems Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195901
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Chen, Liqun. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25283-9">http://dx.doi.org/10.1007/978-3-642-25283-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programming Languages and Systems 9th Asian Symposium, APLAS 2011, Kenting, Taiwan, December 5-7, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195911
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Yang, Hongseok. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25318-8">http://dx.doi.org/10.1007/978-3-642-25318-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195931
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195937
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Yang, Bo-Yin. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195966
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Lin, Dongdai. editor. Tsudik, Gene. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25513-7">http://dx.doi.org/10.1007/978-3-642-25513-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195967
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Chen, Liqun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
ent://SD_ILS/0/SD_ILS:195982
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in Data Outsourcing
ent://SD_ILS/0/SD_ILS:172941
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Foresti, Sara. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantitative Security Risk Assessment of Enterprise Networks
ent://SD_ILS/0/SD_ILS:174032
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Ou, Xinming. author. Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1860-3">http://dx.doi.org/10.1007/978-1-4614-1860-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security strategy from requirements to reality
ent://SD_ILS/0/SD_ILS:288851
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Stackpole, Bill. Oksendahl, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:288879
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Liu, Lei, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk assessment handbook a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:288890
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Landoll, Douglas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selling professional services to the Fortune 500
ent://SD_ILS/0/SD_ILS:293112
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Luefschuetz, Gary S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/selling-professional-services-to-fortune-500-how-win-in-billiondollar-market-strategy-consulting-technology-solutions-outsourcing">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical risk management for the CIO
ent://SD_ILS/0/SD_ILS:291571
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Scherling, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Computing and Networking 12th International Conference, ICDCN 2011, Bangalore, India, January 2-5, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:193675
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Aguilera, Marcos K. editor. Yu, Haifeng. editor. Vaidya, Nitin H. editor. Srinivasan, Vikram. editor. Choudhury, Romit Roy. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17679-1">http://dx.doi.org/10.1007/978-3-642-17679-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193686
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193823
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Burmester, Mike. editor. Tsudik, Gene. editor. Magliveras, Spyros. editor. Ilić, Ivana. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topics in Cryptology – CT-RSA 2011 The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:193925
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Kiayias, Aggelos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19074-2">http://dx.doi.org/10.1007/978-3-642-19074-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193761
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Chung, Yongwha. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194086
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Ishai, Yuval. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194143
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Degano, Pierpaolo. editor. Etalle, Sandro. editor. Guttman, Joshua. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-19751-2">http://dx.doi.org/10.1007/978-3-642-19751-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194568
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194571
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Autonomic and Trusted Computing 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195360
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Calero, Jose M. Alcaraz. editor. Yang, Laurence T. editor. Mármol, Félix Gómez. editor. García Villalba, Luis Javier. editor. Li, Andy Xiaolin. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23496-5">http://dx.doi.org/10.1007/978-3-642-23496-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Hardware and Embedded Systems – CHES 2011 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195497
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Preneel, Bart. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23951-9">http://dx.doi.org/10.1007/978-3-642-23951-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Protection V 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195772
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Butts, Jonathan. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24864-1">http://dx.doi.org/10.1007/978-3-642-24864-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – INDOCRYPT 2011 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195988
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Bernstein, Daniel J. editor. Chatterjee, Sanjit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25578-6">http://dx.doi.org/10.1007/978-3-642-25578-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Card Research and Advanced Applications 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196143
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Prouff, Emmanuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27257-8">http://dx.doi.org/10.1007/978-3-642-27257-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Counterterrorism and Open Source Intelligence
ent://SD_ILS/0/SD_ILS:197734
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Wiil, Uffe Kock. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-7091-0388-3">http://dx.doi.org/10.1007/978-3-7091-0388-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Metriken – der Schlüssel zum erfolgreichen Security und Compliance Monitoring Design, Implementierung und Validierung in der Praxis
ent://SD_ILS/0/SD_ILS:199028
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Sowa, Aleksandra. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8194-6">http://dx.doi.org/10.1007/978-3-8348-8194-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Notfallmanagement mit System Notfälle bei der Informationsverarbeitung sicher beherrschen
ent://SD_ILS/0/SD_ILS:199046
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Klett, Gerhard. author. Schröder, Klaus-Werner. author. Kersten, Heinrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8226-4">http://dx.doi.org/10.1007/978-3-8348-8226-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Sicherheit zwischen Regulierung und Innovation Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit
ent://SD_ILS/0/SD_ILS:199065
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Bub, Udo. editor. Wolfenstetter, Klaus-Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8256-1">http://dx.doi.org/10.1007/978-3-8348-8256-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference
ent://SD_ILS/0/SD_ILS:199891
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks Critical Information Infrastructure Protection
ent://SD_ILS/0/SD_ILS:204062
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Raghavan, S.V. editor. Dawson, E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-81-322-0277-6">http://dx.doi.org/10.1007/978-81-322-0277-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Internet
ent://SD_ILS/0/SD_ILS:204521
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Salgarelli, Luca. editor. Bianchi, Giuseppe. editor. Blefari-Melazzi, Nicola. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-1818-1">http://dx.doi.org/10.1007/978-88-470-1818-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Model-Driven Risk Analysis The CORAS Approach
ent://SD_ILS/0/SD_ILS:191958
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Lund, Mass Soldal. author. Solhaug, Bjørnar. author. Stølen, Ketil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12323-8">http://dx.doi.org/10.1007/978-3-642-12323-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Apple's iPad im Enterprise-Einsatz Einsatzmöglichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmen
ent://SD_ILS/0/SD_ILS:192969
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Oelmaier, Florian. author. Hörtreiter, Jochen. author. Seitz, Andreas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15437-9">http://dx.doi.org/10.1007/978-3-642-15437-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identitätsdiebstahl und Identitätsmissbrauch im Internet Rechtliche und technische Aspekte
ent://SD_ILS/0/SD_ILS:193099
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Borges, Georg. author. Schwenk, Jörg. author. Stuckenberg, Carl-Friedrich. author. Wegener, Christoph. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15833-9">http://dx.doi.org/10.1007/978-3-642-15833-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193101
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Domingo-Ferrer, Josep. editor. Magkos, Emmanouil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15838-4">http://dx.doi.org/10.1007/978-3-642-15838-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193265
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Bao, Feng. editor. Yung, Moti. editor. Lin, Dongdai. editor. Jing, Jiwu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – EUROCRYPT 2011 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194380
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Paterson, Kenneth G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20465-4">http://dx.doi.org/10.1007/978-3-642-20465-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194663
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Herrero, Álvaro. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fast Software Encryption 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194789
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Joux, Antoine. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21702-9">http://dx.doi.org/10.1007/978-3-642-21702-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Networks 18th Conference, CN 2011, Ustron, Poland, June 14-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194812
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Kwiecień, Andrzej. editor. Gaj, Piotr. editor. Stera, Piotr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21771-5">http://dx.doi.org/10.1007/978-3-642-21771-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194726
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Lai, Xuejia. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194738
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Lopez, Javier. editor. Tsudik, Gene. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wired/Wireless Internet Communications 9th IFIP TC 6 International Conference, WWIC 2011, Vilanova i la Geltrú, Spain, June 15-17, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194740
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Masip-Bruin, Xavier. editor. Verchere, Dominique. editor. Tsaoussidis, Vassilis. editor. Yannuzzi, Marcelo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21560-5">http://dx.doi.org/10.1007/978-3-642-21560-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Enhancing Technologies 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194968
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Fischer-Hübner, Simone. editor. Hopper, Nicholas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22263-4">http://dx.doi.org/10.1007/978-3-642-22263-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public Key Infrastructures, Services and Applications 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195089
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Camenisch, Jan. editor. Lambrinoudakis, Costas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22633-5">http://dx.doi.org/10.1007/978-3-642-22633-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Parallel and Distributed Computing and Networks International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195111
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Qi, Luo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22706-6">http://dx.doi.org/10.1007/978-3-642-22706-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195141
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Rogaway, Phillip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22792-9">http://dx.doi.org/10.1007/978-3-642-22792-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security Analysis and Design VI FOSAD Tutorial Lectures
ent://SD_ILS/0/SD_ILS:195231
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Aldini, Alessandro. editor. Gorrieri, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23082-0">http://dx.doi.org/10.1007/978-3-642-23082-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195586
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Flammini, Francesco. editor. Bologna, Sandro. editor. Vittorini, Valeria. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 5th International Conference, ProvSec 2011, Xi’an, China, October 16-18, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195600
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Boyen, Xavier. editor. Chen, Xiaofeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24316-5">http://dx.doi.org/10.1007/978-3-642-24316-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Information Security A Hands-on Approach
ent://SD_ILS/0/SD_ILS:195648
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Basin, David. author. Schaller, Patrick. author. Schläpfer, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24474-2">http://dx.doi.org/10.1007/978-3-642-24474-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dependable and Historic Computing Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday
ent://SD_ILS/0/SD_ILS:195668
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Jones, Cliff B. editor. Lloyd, John L. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24541-1">http://dx.doi.org/10.1007/978-3-642-24541-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stabilization, Safety, and Security of Distributed Systems 13th International Symposium, SSS 2011, Grenoble, France, October 10-12, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195671
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Défago, Xavier. editor. Petit, Franck. editor. Villain, Vincent. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24550-3">http://dx.doi.org/10.1007/978-3-642-24550-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195771
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Lai, Xuejia. editor. Zhou, Jianying. editor. Li, Hui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Kryptographie und IT-Sicherheit Grundlagen und Anwendungen
ent://SD_ILS/0/SD_ILS:198973
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Spitz, Stephan. author. Pramateftakis, Michael. author. Swoboda, Joachim. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8120-5">http://dx.doi.org/10.1007/978-3-8348-8120-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT-Sicherheit mit System Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung
ent://SD_ILS/0/SD_ILS:199017
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Müller, Klaus-Rainer. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8178-6">http://dx.doi.org/10.1007/978-3-8348-8178-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010
ent://SD_ILS/0/SD_ILS:199932
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Klipper, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Trends for FPGAS From Secured to Secure Reconfigurable Systems
ent://SD_ILS/0/SD_ILS:206038
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Badrignans, Benoit. editor. Danger, Jean Luc. editor. Fischer, Viktor. editor. Gogniat, Guy. editor. Torres, Lionel. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-94-007-1338-3">http://dx.doi.org/10.1007/978-94-007-1338-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transparent User Authentication Biometrics, RFID and Behavioural Profiling
ent://SD_ILS/0/SD_ILS:168600
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Clarke, Nathan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-85729-805-8">http://dx.doi.org/10.1007/978-0-85729-805-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9 A25 P45 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Legal issues in information security
ent://SD_ILS/0/SD_ILS:365418
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Grama, Joanna Lyn, author.<br/>Preferred Shelf Number KF1263.C65 G73 2011<br/>Format: Books<br/>Availability Law Library~1<br/>
Security de-engineering solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:286209
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Tibble, Ian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT security metrics a practical framework for measuring security & protecting data
ent://SD_ILS/0/SD_ILS:293294
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle RMAN 11g backup and recovery
ent://SD_ILS/0/SD_ILS:293308
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Freeman, Robert G., 1965- Hart, Matthew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-rman-11g-backup-recovery">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle data guard 11g handbook
ent://SD_ILS/0/SD_ILS:293374
2024-11-07T01:11:33Z
2024-11-07T01:11:33Z
Author Carpenter, Larry. Meeks, Joseph. Kim, Charles. Burke, Bill. Carothers, Sonya.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-data-guard-11g-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>