Search Results for Information security. - Narrowed by: 2010 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ps$003d300? 2026-01-20T17:45:36Z Electronic Healthcare Information Security ent://SD_ILS/0/SD_ILS:167753 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Shoniregun, Charles A. author.&#160;Dube, Kudakwashe. author.&#160;Mtenzi, Fredrick. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:539793 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:538782 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:538713 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:172736 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Moore, Tyler. editor.&#160;Pym, David. editor.&#160;Ioannidis, Christos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CyberForensics Understanding Information Security Investigations ent://SD_ILS/0/SD_ILS:175048 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Bayuk, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-60761-772-3">http://dx.doi.org/10.1007/978-1-60761-772-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:190841 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Stavroulakis, Peter. editor.&#160;Stamp, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Trinckes, John J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T75 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Volume 4 ent://SD_ILS/0/SD_ILS:540034 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439819036">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Security for Microsoft Windows System Administrators introduction to key information security concepts ent://SD_ILS/0/SD_ILS:149122 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Rountree, Derrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers ent://SD_ILS/0/SD_ILS:192634 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Rome, Erich. editor.&#160;Bloomfield, Robin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14379-3">http://dx.doi.org/10.1007/978-3-642-14379-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information, Security and Cryptology &ndash; ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192649 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Lee, Donghoon. editor.&#160;Hong, Seokhie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:192673 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kurosawa, Kaoru. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings ent://SD_ILS/0/SD_ILS:192745 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Abdalla, Michel. editor.&#160;Barreto, Paulo S. L. M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14712-8">http://dx.doi.org/10.1007/978-3-642-14712-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy &ndash; Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192911 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Rannenberg, Kai. editor.&#160;Varadharajan, Vijay. editor.&#160;Weber, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15257-3">http://dx.doi.org/10.1007/978-3-642-15257-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS&rsquo;10) ent://SD_ILS/0/SD_ILS:193359 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Herrero, &Aacute;lvaro. editor.&#160;Corchado, Emilio. editor.&#160;Redondo, Carlos. editor.&#160;Alonso, &Aacute;ngel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16626-6">http://dx.doi.org/10.1007/978-3-642-16626-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193582 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Abe, Masayuki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193653 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-chi. editor.&#160;Khan, Muhammad Khurram. editor.&#160;Arnett, Kirk P. editor.&#160;Kang, Heau-jo. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191973 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Samarati, Pierangela. editor.&#160;Tunstall, Michael. editor.&#160;Posegga, Joachim. editor.&#160;Markantonakis, Konstantinos. editor.&#160;Sauveron, Damien. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference ent://SD_ILS/0/SD_ILS:199483 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Pohlmann, Norbert. editor.&#160;Reimer, Helmut. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192312 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Bandyopadhyay, Samir Kumar. editor.&#160;Adi, Wael. editor.&#160;Kim, Tai-hoon. editor.&#160;Xiao, Yang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13365-7">http://dx.doi.org/10.1007/978-3-642-13365-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192544 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Steinfeld, Ron. editor.&#160;Hawkes, Philip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191714 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Weerasinghe, Dasun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192123 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kwak, Jin. editor.&#160;Deng, Robert H. editor.&#160;Won, Yoojae. editor.&#160;Wang, Guilin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193422 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Echizen, Isao. editor.&#160;Kunihiro, Noboru. editor.&#160;Sasaki, Ryoichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193620 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Lioy, Antonio. editor.&#160;Prasad, Neeli R. editor.&#160;Lian, Shiguo. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193666 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Soriano, Miguel. editor.&#160;Qing, Sihan. editor.&#160;L&oacute;pez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing an information security and privacy awareness and training program ent://SD_ILS/0/SD_ILS:538947 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Herold, Rebecca., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H46 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439815465">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection and Prevention Concepts and Techniques ent://SD_ILS/0/SD_ILS:167906 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Ghorbani, Ali A. author.&#160;Lu, Wei. author.&#160;Tavallaee, Mahbod. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive Cryptographic Access Control ent://SD_ILS/0/SD_ILS:172654 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kayem, Anne V. D. M. author.&#160;Akl, Selim G. author.&#160;Martin, Patrick. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:172782 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Probst, Christian W. editor.&#160;Hunker, Jeffrey. editor.&#160;Gollmann, Dieter. editor.&#160;Bishop, Matt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Efficient Secure Two-Party Protocols Techniques and Constructions ent://SD_ILS/0/SD_ILS:192608 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Hazay, Carmit. author.&#160;Lindell, Yehuda. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Statistical Steganalysis ent://SD_ILS/0/SD_ILS:192611 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;B&ouml;hme, Rainer. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14313-7">http://dx.doi.org/10.1007/978-3-642-14313-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Locally Decodable Codes and Private Information Retrieval Schemes ent://SD_ILS/0/SD_ILS:192626 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Yekhanin, Sergey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14358-8">http://dx.doi.org/10.1007/978-3-642-14358-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Hardware-Intrinsic Security Foundations and Practice ent://SD_ILS/0/SD_ILS:192659 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encryption for Digital Content ent://SD_ILS/0/SD_ILS:171850 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kiayias, Aggelos. author.&#160;Pehlivanoglu, Serdar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Situational Awareness Issues and Research ent://SD_ILS/0/SD_ILS:171874 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Jajodia, Sushil. editor.&#160;Liu, Peng. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Signcryption ent://SD_ILS/0/SD_ILS:189264 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Dent, Alexander W. editor.&#160;Zheng, Yuliang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The LLL Algorithm Survey and Applications ent://SD_ILS/0/SD_ILS:190278 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Nguyen, Phong Q. editor.&#160;Vall&eacute;e, Brigitte. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vulnerability management ent://SD_ILS/0/SD_ILS:545698 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Foreman, Park., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F656 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439801512">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Advances in cross-cultural decision making ent://SD_ILS/0/SD_ILS:546096 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Schmorrow, Dylan, 1967-&#160;Nicholson, Denise, 1967-<br/>Preferred Shelf Number&#160;BF448 .A377 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439834961">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Urbanization, policing, and security : global perspectives ent://SD_ILS/0/SD_ILS:541422 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Cordner, Gary W.&#160;Cordner, AnnMarie.&#160;Das, Dilip K., 1941-<br/>Preferred Shelf Number&#160;HT361 .U727 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420085587">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Border security in the Al-Qaeda era ent://SD_ILS/0/SD_ILS:538571 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Winterdyk, John.&#160;Sundberg, Kelly W.<br/>Preferred Shelf Number&#160;K3265 .B67 2010 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781420085464">https://www.taylorfrancis.com/books/9781420085464</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802899">https://www.taylorfrancis.com/books/9780367802899</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of aviation human factors ent://SD_ILS/0/SD_ILS:542133 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Wise, John A., 1944-&#160;Hopkin, V. David.&#160;Garland, Daniel J.<br/>Preferred Shelf Number&#160;TL553.6 .H35 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420063578">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Critical infrastructure : homeland security and emergency preparedness ent://SD_ILS/0/SD_ILS:545403 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Radvanovsky, Robert., author.&#160;McDougall, Allan.<br/>Preferred Shelf Number&#160;UA927 .R34 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420095289">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Airport and aviation security : U.S. policy and strategy in the age of global terrorism ent://SD_ILS/0/SD_ILS:539399 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Elias, Bartholomew., author.<br/>Preferred Shelf Number&#160;TL725.3 .S44 E45 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420070309">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CISSP CBK ent://SD_ILS/0/SD_ILS:540690 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;QA76.3 .T565 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439809600">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>