Search Results for Design. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDesign.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2026-02-09T11:54:41Z Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:543620 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M85 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> VLSI Design and Test for Systems Dependability ent://SD_ILS/0/SD_ILS:483711 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Asai, Shojiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-4-431-56594-9">https://doi.org/10.1007/978-4-431-56594-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Exploring security in software architecture and design ent://SD_ILS/0/SD_ILS:481871 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Felderer, Michael, editor.&#160;Scandariato, Riccardo, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:488519 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Al-Shaer, Ehab. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10371-6">https://doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> SAFEGUARDING THE FUTURE security and privacy by design for ai, metaverse, blockchain, and beyond. ent://SD_ILS/0/SD_ILS:573480 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Tang, Alan.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003390695">https://www.taylorfrancis.com/books/9781003390695</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security awareness design in the new normal age ent://SD_ILS/0/SD_ILS:585813 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Goucher, Wendy, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003194583">https://www.taylorfrancis.com/books/9781003194583</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3&ndash;5, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485759 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Polian, Ilia. editor. (orcid)0000-0002-6563-2725&#160;St&ouml;ttinger, Marc. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16350-1">https://doi.org/10.1007/978-3-030-16350-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Microgrids From Design to Laboratory-Scale Implementation ent://SD_ILS/0/SD_ILS:483310 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Bahrami, Shahab. editor.&#160;Mohammadi, Ali. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02656-1">https://doi.org/10.1007/978-3-030-02656-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysis ent://SD_ILS/0/SD_ILS:398995 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Nakahara Jr., Jorge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400637 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Fan, Junfeng. editor.&#160;Gierlichs, Benedikt. editor. (orcid)0000-0002-5866-1990&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberpatterns Unifying Design Patterns with Security and Attack Patterns ent://SD_ILS/0/SD_ILS:488814 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Blackwell, Clive. editor.&#160;Zhu, Hong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04447-7">https://doi.org/10.1007/978-3-319-04447-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488920 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:296665 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Ye, Nong.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F5334 2000<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fully Homomorphic Encryption in Real World Applications ent://SD_ILS/0/SD_ILS:484546 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Chatterjee, Ayantika. author.&#160;Aung, Khin Mi Mi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-6393-1">https://doi.org/10.1007/978-981-13-6393-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building effective privacy programs : cybersecurity from principles to practice ent://SD_ILS/0/SD_ILS:600111 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;Weaver, Griffin, author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .P735 E34 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394342662</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alice and Bob learn secure coding ent://SD_ILS/0/SD_ILS:599664 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Janca, Tanya. author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277179</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer ent://SD_ILS/0/SD_ILS:599946 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Chapple, Mike, author.&#160;Shelley, Joe.&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-Enabled Threat Intelligence and Cyber Risk Assessment ent://SD_ILS/0/SD_ILS:582312 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Martiri, Edlira, editor&#160;Vajjhala, Narasimha, 1978- editor.&#160;Dalipi, Fisnik, editor<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003504979">https://www.taylorfrancis.com/books/9781003504979</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security technologies for law enforcement agencies ent://SD_ILS/0/SD_ILS:589138 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Duraklar, Kaz&#305;m author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Cyber Engineering and Advanced Security Algorithms ent://SD_ILS/0/SD_ILS:588161 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Merat, Soorena, author.&#160;Almuhtadi, Wahab, author<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003500698">https://www.taylorfrancis.com/books/9781003500698</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q36 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> BLOCKCHAIN AND DIGITAL TWIN ENABLED IOT NETWORKS privacy and security. ent://SD_ILS/0/SD_ILS:569607 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Kumar, Randhir.&#160;Kumar, Prabhat.&#160;C C, Sobin.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003403791">https://www.taylorfrancis.com/books/9781003403791</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A98 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Rawat, Romil, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 Q83 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> System Reliability and Security Techniques and Methodologies. ent://SD_ILS/0/SD_ILS:576623 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Iqbal, Javaid.&#160;Masoodi, Faheem Syeed.&#160;Ahmad Malik, Ishfaq.&#160;Khurshid, Shozab.&#160;Saraf, Iqra.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032624983">https://www.taylorfrancis.com/books/9781032624983</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and High-Performance Computing Environments : Integrated Innovations, Practices, and Applications. ent://SD_ILS/0/SD_ILS:559667 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Li, Kuan-Ching.&#160;Sukhija, Nitin.&#160;Bautista, Elizabeth.&#160;Gaudiot, Jean-Luc.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003155799">https://www.taylorfrancis.com/books/9781003155799</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing secure systems. ent://SD_ILS/0/SD_ILS:565417 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Melone, Michael, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 M45 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003144182">https://www.taylorfrancis.com/books/9781003144182</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R438 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure data science : integrating cyber security and data science ent://SD_ILS/0/SD_ILS:574976 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Thuraisingham, Bhavani M., author.&#160;Kantarcioglu, Murat, author.&#160;Khan, Latifur, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003081845">https://www.taylorfrancis.com/books/9781003081845</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts ent://SD_ILS/0/SD_ILS:597703 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Poston, Howard E., III, author.<br/>Preferred Shelf Number&#160;QA76.9 .B56 P67 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320691</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust-based communication systems for internet of things applications ent://SD_ILS/0/SD_ILS:597744 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Madaan, Vishu, editor.&#160;Agrawal, Prateek, editor.&#160;Sharma, Anand, editor.&#160;Sharma, Dilip Kumar, editor.&#160;Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to machine learning with applications in information security ent://SD_ILS/0/SD_ILS:581034 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Stamp, Mark, author.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264873">https://www.taylorfrancis.com/books/9781003264873</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for everyone ent://SD_ILS/0/SD_ILS:552856 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Skillicorn, David B., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003124030">https://www.taylorfrancis.com/books/9781003124030</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing security foundations and challenges ent://SD_ILS/0/SD_ILS:580601 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and optimization ent://SD_ILS/0/SD_ILS:556640 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Tanwar, Rohit, editor.&#160;Choudhury, Tanupriya, editor.&#160;Zamani, Mazdak, editor.&#160;Gupta, Sunil, 1979- editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I63 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical AI for Cybersecurity ent://SD_ILS/0/SD_ILS:574909 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Das, Ravindra.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003005230">https://www.taylorfrancis.com/books/9781003005230</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:596480 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Euro-Par 2018: Parallel Processing Workshops Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482657 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Mencagli, Gabriele. editor.&#160;B. Heras, Dora. editor.&#160;Cardellini, Valeria. editor.&#160;Casalicchio, Emiliano. editor.&#160;Jeannot, Emmanuel. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10549-5">https://doi.org/10.1007/978-3-030-10549-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Computer Sciences in Engineering 6th Workshop on Engineering Applications, WEA 2019, Santa Marta, Colombia, October 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:482895 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Figueroa-Garc&iacute;a, Juan Carlos. editor. (orcid)0000-0001-5544-5937&#160;Duarte-Gonz&aacute;lez, Mario. editor.&#160;Jaramillo-Isaza, Sebasti&aacute;n. editor. (orcid)0000-0002-2134-772X&#160;Orjuela-Ca&ntilde;on, Alvaro David. editor. (orcid)0000-0002-2057-7603&#160;D&iacute;az-Gutierrez, Yesid. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31019-6">https://doi.org/10.1007/978-3-030-31019-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> High-Performance Computing Applications in Numerical Simulation and Edge Computing ACM ICS 2018 International Workshops, HPCMS and HiDEC, Beijing, China, June 12, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483956 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Hu, Changjun. editor.&#160;Yang, Wen. editor.&#160;Jiang, Congfeng. editor.&#160;Dai, Dong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-32-9987-0">https://doi.org/10.1007/978-981-32-9987-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII ent://SD_ILS/0/SD_ILS:485990 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Hameurlain, Abdelkader. editor.&#160;Wagner, Roland. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:595099 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Le, Dac-Nhuong, 1983- editor.&#160;Kumar, Raghvendra, 1987- editor.&#160;Mishra, Brojo Kishore, 1979- editor.&#160;Khari, Manju, editor.&#160;Chatterjee, Jyotir Moy, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399353 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Lahiri, Shuvendu K. editor.&#160;Wang, Chao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400194 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Manulis, Mark. editor. (orcid)0000-0002-1512-9670&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400513 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:401495 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Shi, Yong. editor.&#160;Fu, Haohuan. editor.&#160;Tian, Yingjie. editor.&#160;Krzhizhanovskaya, Valeria V. editor. (orcid)0000-0002-8247-129X&#160;Lees, Michael Harold. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93701-4">https://doi.org/10.1007/978-3-319-93701-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11&ndash;13, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:401521 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Shi, Yong. editor.&#160;Fu, Haohuan. editor.&#160;Tian, Yingjie. editor.&#160;Krzhizhanovskaya, Valeria V. editor. (orcid)0000-0002-8247-129X&#160;Lees, Michael Harold. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93698-7">https://doi.org/10.1007/978-3-319-93698-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11&ndash;13, 2018 Proceedings, Part III ent://SD_ILS/0/SD_ILS:401990 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Shi, Yong. editor.&#160;Fu, Haohuan. editor.&#160;Tian, Yingjie. editor.&#160;Krzhizhanovskaya, Valeria V. editor. (orcid)0000-0002-8247-129X&#160;Lees, Michael Harold. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93713-7">https://doi.org/10.1007/978-3-319-93713-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, V&auml;ster&aring;s, Sweden, September 19-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400344 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Skavhaug, Amund. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tests and Proofs 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401698 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Dubois, Catherine. editor.&#160;Wolff, Burkhart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92994-1">https://doi.org/10.1007/978-3-319-92994-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Service Oriented Architectures. ent://SD_ILS/0/SD_ILS:542633 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Williams, Walter, author.&#160;CRC Press LLC.<br/>Preferred Shelf Number&#160;TK5105.5828 .W55 2017<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:545960 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Baker, Paul, 1958, author.&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;HV8290 .B34 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computer architecture and security : fundamentals of designing secure computer systems ent://SD_ILS/0/SD_ILS:248865 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Wang, Shuangbao Paul.&#160;Ledley, Robert Steven.<br/>Preferred Shelf Number&#160;QA76.9.A73 W36 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:540156 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Merkow, Mark S., author.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;QA76.76 .T48 M47 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439866221">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:541754 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Paul, Mano., author.<br/>Preferred Shelf Number&#160;QA76.76 .D47 P3775 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security in Distributed, Grid, Mobile, and Pervasive Computing. ent://SD_ILS/0/SD_ILS:544847 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Preferred Shelf Number&#160;QA76.9<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429119347">https://www.taylorfrancis.com/books/9780429119347</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The CISO handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:539204 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Gentile, Michael., author.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Preferred Shelf Number&#160;HF5548.37 .G46 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 T47 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Public key infrastructure : building trusted applications and Web services ent://SD_ILS/0/SD_ILS:543281 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P85 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:253969 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Traxler, Julie.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:545821 2026-02-09T11:54:41Z 2026-02-09T11:54:41Z Author&#160;Held, Jonathan S., author.&#160;Bowers, John R.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H435 2001<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031553">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>