Search Results for Information security. - Narrowed by: 2018 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092018$0025092018$0026ps$003d300? 2026-01-20T17:45:36Z Information security management handbook ent://SD_ILS/0/SD_ILS:542831 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:539793 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;QA76.9 .A25 I54165 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> (ISC)&sup2; CISSP certified information systems security professional official study guide ent://SD_ILS/0/SD_ILS:594477 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Chapple, Mike, author.&#160;Stewart, James Michael, author.&#160;Gibson, Darril, author.<br/>Preferred Shelf Number&#160;QA76.3 .C4255 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549567">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549567</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:399545 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399923 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400786 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Qing, Sihan. editor.&#160;Mitchell, Chris. editor.&#160;Chen, Liqun. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400830 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Chen, Xiaofeng. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402215 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Hancke, Gerhard P. editor.&#160;Damiani, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400111 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Inomata, Atsuo. editor.&#160;Yasuda, Kan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400376 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Chen, Qingfeng. editor.&#160;Wu, Jia. editor.&#160;Zhang, Shichao. editor.&#160;Yuan, Changan. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401614 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kim, Howon. editor.&#160;Kim, Dong-Chan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401682 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006&#160;Kim, Taesoo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Information Security A Competency-Based Education Course ent://SD_ILS/0/SD_ILS:401941 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Alsmadi, Izzat. author.&#160;Burdwell, Robert. author.&#160;Aleroud&nbsp;, Ahmed. author.&#160;Wahbeh, Abdallah. author.&#160;Al-Qudah, Mahmoud. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401992 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Yang, Guomin. editor. (orcid)0000-0002-4949-7738&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2&ndash;6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399086 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197&#160;Galbraith, Steven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399972 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Su, Chunhua. editor.&#160;Kikuchi, Hiroaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399995 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335&#160;Scala, Antonio. editor. (orcid)0000-0002-3414-2686&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400052 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Naccache, David. editor. (orcid)0000-0002-8651-6555&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Qing, Sihan. editor.&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Blanc, Gregory. editor. (orcid)0000-0001-8150-6617<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401486 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Mori, Paolo. editor.&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Camp, Olivier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402736 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201&#160;Campegiani, Paolo. editor.&#160;Czach&oacute;rski, Tadeusz. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Komnios, Ioannis. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Education &ndash; Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399019 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400194 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Manulis, Mark. editor. (orcid)0000-0002-1512-9670&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400247 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Ganapathy, Vinod. editor.&#160;Jaeger, Trent. editor.&#160;Shyamasundar, R.K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Micro-Grid Systems Security and Privacy ent://SD_ILS/0/SD_ILS:399573 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Kayem, Anne V. D. M. editor.&#160;Wolthusen, Stephen D. editor.&#160;Meinel, Christoph. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Threat Intelligence ent://SD_ILS/0/SD_ILS:400906 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Dehghantanha, Ali. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Dargahi, Tooska. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modelling and Verification of Secure Exams ent://SD_ILS/0/SD_ILS:401571 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Giustolisi, Rosario. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:399974 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Somani, Gaurav. editor.&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bilgi g&uuml;venli&#287;i y&ouml;netim sistemi : ISO 27001 : 2013 uygulama k&#305;lavuzu ent://SD_ILS/0/SD_ILS:423191 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;&Ccedil;ubuk&ccedil;u, Faruk.<br/>Preferred Shelf Number&#160;TS156.6 C838 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook of Applied Cryptography ent://SD_ILS/0/SD_ILS:546435 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Menezes, Alfred J., author.&#160;Katz, Jonathan, author.&#160;van Oorschot, Paul C., author.&#160;Vanstone, Scott A., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding, assessing, and responding to terrorism protecting critical infrastructure and personnel ent://SD_ILS/0/SD_ILS:593975 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Bennett, Brian T., editor.<br/>Preferred Shelf Number&#160;UA927<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119237792">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119237792</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Comprehensive guide to 5G security ent://SD_ILS/0/SD_ILS:594025 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Liyanage, Madhusanka, editor.&#160;Ahmad, Ijaz, 1985- editor.&#160;Abro, Ahmed Bux, editor.&#160;Gurtov, Andrei, editor.&#160;Ylianttila, Mika, editor.<br/>Preferred Shelf Number&#160;TK5103.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119293071">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119293071</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of safety principles ent://SD_ILS/0/SD_ILS:594034 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;M&ouml;ller, Niklas, editor.&#160;Hansson, Sven Ove, 1951- editor.&#160;Holmberg, Jan-Erik, editor.<br/>Preferred Shelf Number&#160;HD7261 .H36 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119443070">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119443070</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unstructured data analytics : how to improve customer acquisition, customer retention, and fraud detection and prevention ent://SD_ILS/0/SD_ILS:594382 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Isson, Jean Paul, 1971-<br/>Preferred Shelf Number&#160;HD30.215<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119378846">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119378846</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food and drink--good manufacturing practice : a guide to its responsible management ent://SD_ILS/0/SD_ILS:594466 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Manning, Louise, editor.<br/>Preferred Shelf Number&#160;TP369 .G7<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119388494">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119388494</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart grid communication infrastructures : big data, cloud computing, and security ent://SD_ILS/0/SD_ILS:594395 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Ye, Feng, 1989- author.&#160;Qian, Yi, 1962- author.&#160;Hu, Rose Qingyang, author.<br/>Preferred Shelf Number&#160;TK3105<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119240136">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119240136</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mastering Windows Server 2016 ent://SD_ILS/0/SD_ILS:594597 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Svidergol, Brian, author.&#160;Meloski, Vladimir, author.&#160;Wright, Byron, author.&#160;Martinez, Santos, 1982- author.&#160;Bassett, Doug, author.<br/>Preferred Shelf Number&#160;QA76.9 .V5<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549277">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549277</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics ent://SD_ILS/0/SD_ILS:593346 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;&Aring;rnes, Andr&eacute;, 1976- editor.<br/>Preferred Shelf Number&#160;HV8079 .C65<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical guide to LTE-A, VoLTE and IoT : paving the way towards 5G ent://SD_ILS/0/SD_ILS:594267 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;ElNashar, Ayman, author.<br/>Preferred Shelf Number&#160;TK5103.2 .E4825 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119063407">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119063407</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threats ent://SD_ILS/0/SD_ILS:594407 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Arduin, Pierre-Emmanuel, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social engineering : the science of human hacking ent://SD_ILS/0/SD_ILS:594635 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Hadnagy, Christopher, author.<br/>Preferred Shelf Number&#160;HM668 .H33 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:593721 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Song, Houbing, editor.&#160;Fink, Glenn A., editor.&#160;Jeschke, Sabina, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43923 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IPTV delivery networks : next generation architectures for live and video-on-demand services ent://SD_ILS/0/SD_ILS:594133 2026-01-20T17:45:36Z 2026-01-20T17:45:36Z Author&#160;Fati, Suliman Mohamed, 1978- editor.&#160;Azad, Saiful, editor.&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;TK5105.887 .I68 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119397939">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119397939</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>