Search Results for Information security. - Narrowed by: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list
2026-01-17T18:00:29Z
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number QA76.9 .A25 P427 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Electronic Healthcare Information Security
ent://SD_ILS/0/SD_ILS:167753
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Shoniregun, Charles A. author. Dube, Kudakwashe. author. Mtenzi, Fredrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Information and Communication Security
ent://SD_ILS/0/SD_ILS:190841
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:172736
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Moore, Tyler. editor. Pym, David. editor. Ioannidis, Christos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Trinckes, John J., author.<br/>Preferred Shelf Number HF5548.37 .T75 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy III
ent://SD_ILS/0/SD_ILS:331294
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Schneier, Bruce. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331294.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:334810
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Böhme, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334810.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Information Security A Hands-on Approach
ent://SD_ILS/0/SD_ILS:195648
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Basin, David. author. Schaller, Patrick. author. Schläpfer, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24474-2">http://dx.doi.org/10.1007/978-3-642-24474-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Herrmann, Debra S., author.<br/>Preferred Shelf Number QA76.9 .A25 H47 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2022, Volume 3
ent://SD_ILS/0/SD_ILS:526885
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Dutta, Paramartha. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. Lai, Wen-Cheng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4676-9">https://doi.org/10.1007/978-981-19-4676-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the International Conference on Intelligent Computing, Communication and Information Security ICICCIS 2022
ent://SD_ILS/0/SD_ILS:528020
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Devedzic, Vladan. editor. Agarwal, Basant. editor. Gupta, Mukesh Kumar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1373-2">https://doi.org/10.1007/978-981-99-1373-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:549396
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:567328
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Multimedia Information Security: Techniques and Applications
ent://SD_ILS/0/SD_ILS:483348
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Singh, Amit Kumar. editor. Mohan, Anand. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483576
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483477
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483660
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Venter, Hein. editor. (orcid)0000-0002-3607-8630 Loock, Marianne. editor. (orcid)0000-0001-8005-716X Coetzee, Marijke. editor. (orcid)0000-0002-9157-3079 Eloff, Mariki. editor. (orcid)0000-0001-8997-7931 Eloff, Jan. editor. (orcid)0000-0003-4683-2198<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484509
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Garg, Deepak. editor. (orcid)0000-0002-0888-3093 Kumar, N. V. Narendra. editor. Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402736
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201 Campegiani, Paolo. editor. Czachórski, Tadeusz. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Komnios, Ioannis. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400247
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ganapathy, Vinod. editor. Jaeger, Trent. editor. Shyamasundar, R.K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security leader insights for information protection : lessons and strategies from leading security professionals
ent://SD_ILS/0/SD_ILS:355760
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Fahy, Bob, editor.<br/>Preferred Shelf Number ONLINE(355760.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008430">http://www.sciencedirect.com/science/book/9780128008430</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332941
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Qing, Sihan. editor. Zhou, Jianying. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332941.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334519
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Deng, Robert H. editor. Feng, Tao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334519.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334958
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Preferred Shelf Number ONLINE(334958.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335107
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bologna, Sandro. editor. Hämmerli, Bernhard. editor. Gritzalis, Dimitris. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335107.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335110
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Hämmerli, Bernhard M. editor. Kalstad Svendsen, Nils. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335110.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333008
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Luiijf, Eric. editor. Hartel, Pieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333008.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334786
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334786.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334794
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Dodge, Ronald C. editor. Futcher, Lynn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334794.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334976
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Awad, Ali Ismail. editor. Hassanien, Aboul Ella. editor. Baba, Kensuke. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334976.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:335157
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334720
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334720.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference
ent://SD_ILS/0/SD_ILS:335292
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335292.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334470
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kwon, Taekyoung. editor. Lee, Mun-Kyu. editor. Kwon, Daesung. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334470.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334613
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334613.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335194
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335194.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196303
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196995
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197080
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Susilo, Willy. editor. Mu, Yi. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197153
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kim, Howon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197201
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Smith, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197227
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Quirchmayr, Gerald. editor. Basl, Josef. editor. You, Ilsun. editor. Xu, Lida. editor. Weippl, Edgar. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197475
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197478
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197541
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Wu, Chuan-Kun. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197559
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197566
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Venkatakrishnan, Venkat. editor. Goswami, Diganta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196291
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jung, Souhwan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195894
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bouvry, Pascal. editor. Kłopotek, Mieczysław A. editor. Leprévost, Franck. editor. Marciniak, Małgorzata. editor. Mykowiecka, Agnieszka. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196613
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ryan, Mark D. editor. Smyth, Ben. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197365
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Gollmann, Dieter. editor. Freiling, Felix C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33383-5">http://dx.doi.org/10.1007/978-3-642-33383-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197367
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Schmidt, Andreas U. editor. Russello, Giovanni. editor. Krontiris, Ioannis. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197384
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197580
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lei, Jingsheng. editor. Wang, Fu Lee. editor. Li, Mo. editor. Luo, Yuan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197604
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lee, Dong Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193686
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193823
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Burmester, Mike. editor. Tsudik, Gene. editor. Magliveras, Spyros. editor. Ilić, Ivana. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195771
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lai, Xuejia. editor. Zhou, Jianying. editor. Li, Hui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194466
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Fehr, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194726
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lai, Xuejia. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194568
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194571
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195578
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195683
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195931
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
ent://SD_ILS/0/SD_ILS:195982
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010
ent://SD_ILS/0/SD_ILS:199932
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Klipper, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193265
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bao, Feng. editor. Yung, Moti. editor. Lin, Dongdai. editor. Jing, Jiwu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193761
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Chung, Yongwha. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194663
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Herrero, Álvaro. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference
ent://SD_ILS/0/SD_ILS:199891
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191973
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Samarati, Pierangela. editor. Tunstall, Michael. editor. Posegga, Joachim. editor. Markantonakis, Konstantinos. editor. Sauveron, Damien. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192123
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kwak, Jin. editor. Deng, Robert H. editor. Won, Yoojae. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192544
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193582
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192649
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lee, Donghoon. editor. Hong, Seokhie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14423-3">http://dx.doi.org/10.1007/978-3-642-14423-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:192673
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14496-7">http://dx.doi.org/10.1007/978-3-642-14496-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193422
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Echizen, Isao. editor. Kunihiro, Noboru. editor. Sasaki, Ryoichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16825-3">http://dx.doi.org/10.1007/978-3-642-16825-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference
ent://SD_ILS/0/SD_ILS:199483
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9363-5">http://dx.doi.org/10.1007/978-3-8348-9363-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Information Risk and the Economics of Security
ent://SD_ILS/0/SD_ILS:164782
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Johnson, M. Eric. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09762-6">http://dx.doi.org/10.1007/978-0-387-09762-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
ent://SD_ILS/0/SD_ILS:190785
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Markowitch, Olivier. editor. Bilas, Angelos. editor. Hoepman, Jaap-Henk. editor. Mitchell, Chris J. editor. Quisquater, Jean-Jacques. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03944-7">http://dx.doi.org/10.1007/978-3-642-03944-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191078
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Takagi, Tsuyoshi. editor. Mambo, Masahiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04846-3">http://dx.doi.org/10.1007/978-3-642-04846-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191425
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Datta, Anupam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10622-4">http://dx.doi.org/10.1007/978-3-642-10622-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:191472
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Prakash, Atul. editor. Sen Gupta, Indranil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10772-6">http://dx.doi.org/10.1007/978-3-642-10772-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189648
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Chung, Kyo-Il. editor. Sohn, Kiwook. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00306-6">http://dx.doi.org/10.1007/978-3-642-00306-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:189810
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bao, Feng. editor. Li, Hui. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00843-6">http://dx.doi.org/10.1007/978-3-642-00843-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191592
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Qing, Sihan. editor. Mitchell, Chris J. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11145-7">http://dx.doi.org/10.1007/978-3-642-11145-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191491
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Youm, Heung Youl. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10838-9">http://dx.doi.org/10.1007/978-3-642-10838-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189787
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lee, Pil Joong. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-00730-9">http://dx.doi.org/10.1007/978-3-642-00730-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:189928
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Gritzalis, Dimitris. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01244-0">http://dx.doi.org/10.1007/978-3-642-01244-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189996
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Yung, Moti. editor. Liu, Peng. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01440-6">http://dx.doi.org/10.1007/978-3-642-01440-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190378
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Boyd, Colin. editor. González Nieto, Juan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-02620-1">http://dx.doi.org/10.1007/978-3-642-02620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190962
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Samarati, Pierangela. editor. Yung, Moti. editor. Martinelli, Fabio. editor. Ardagna, Claudio A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04474-8">http://dx.doi.org/10.1007/978-3-642-04474-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191307
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Desmedt, Yvo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10230-1">http://dx.doi.org/10.1007/978-3-642-10230-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191308
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191346
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conference
ent://SD_ILS/0/SD_ILS:199411
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9283-6">http://dx.doi.org/10.1007/978-3-8348-9283-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security governance a practical development and implementation approach
ent://SD_ILS/0/SD_ILS:297743
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy
ent://SD_ILS/0/SD_ILS:164757
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jajodia, Sushil. editor. Samarati, Pierangela. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:188456
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Pei, Dingyi. editor. Yung, Moti. editor. Lin, Dongdai. editor. Wu, Chuankun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188588
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189294
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Matsuura, Kanta. editor. Fujisaki, Eiichiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189347
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Sekar, R. editor. Pujari, Arun K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185962
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Mu, Yi. editor. Susilo, Willy. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:188336
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Chen, Liqun. editor. Mu, Yi. editor. Susilo, Willy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188543
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Onieva, Jose A. editor. Sauveron, Damien. editor. Chaumette, Serge. editor. Gollmann, Dieter. editor. Markantonakis, Konstantinos. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers
ent://SD_ILS/0/SD_ILS:189212
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lopez, Javier. editor. Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:189234
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Pieprzyk, Josef. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188801
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Wu, Tzong-Chen. editor. Lei, Chin-Laung. editor. Rijmen, Vincent. editor. Lee, Der-Tsai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85886-7">http://dx.doi.org/10.1007/978-3-540-85886-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189090
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Chen, Liqun. editor. Ryan, Mark D. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186461
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Dawson, Ed. editor. Wong, Duncan S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186859
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Pieprzyk, Josef. editor. Ghodosi, Hossein. editor. Dawson, Ed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187681
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Nam, Kil-Hyun. editor. Rhee, Gwangsoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa
ent://SD_ILS/0/SD_ILS:166940
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Venter, Hein. editor. Eloff, Mariki. editor. Labuschagne, Les. editor. Eloff, Jan. editor. Solms, Rossouw. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
ent://SD_ILS/0/SD_ILS:167038
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Futcher, Lynn. editor. Dodge, Ronald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:186513
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Sauveron, Damien. editor. Markantonakis, Konstantinos. editor. Bilas, Angelos. editor. Quisquater, Jean-Jacques. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187467
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187720
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kurosawa, Kaoru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187790
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author McDaniel, Patrick. editor. Gupta, Shyam K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:187904
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kim, Sehun. editor. Yung, Moti. editor. Lee, Hyung-Woo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:186175
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lee, Jae Kwang. editor. Yi, Okyeon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187773
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Qing, Sihan. editor. Imai, Hideki. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185180
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Rhee, Min Surp. editor. Lee, Byoungcheon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185214
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lai, Xuejia. editor. Chen, Kefei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185217
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ning, Peng. editor. Qing, Sihan. editor. Li, Ninghui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185235
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lipmaa, Helger. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings
ent://SD_ILS/0/SD_ILS:185666
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bagchi, Aditya. editor. Atluri, Vijayalakshmi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers
ent://SD_ILS/0/SD_ILS:185707
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing database security and auditing a guide for DBAs, information security administrators and auditors
ent://SD_ILS/0/SD_ILS:253860
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ben-Natan, Ron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policies and procedures : a practitioner's reference
ent://SD_ILS/0/SD_ILS:547228
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P428 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security policies, procedures, and standards : guidelines for effective information security management
ent://SD_ILS/0/SD_ILS:546817
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P46 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780849390326">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Malicious Attack Propagation and Source Identification
ent://SD_ILS/0/SD_ILS:482633
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jiang, Jiaojiao. author. Wen, Sheng. author. Liu, Bo. author. Yu, Shui. author. Xiang, Yang. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Security Auditing
ent://SD_ILS/0/SD_ILS:483467
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Majumdar, Suryadipta. author. (orcid)0000-0002-6501-4214 Madi, Taous. author. Wang, Yushun. author. Tabiban, Azadeh. author. Oqaily, Momen. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-23128-6">https://doi.org/10.1007/978-3-030-23128-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Industrial Control Systems Security and Resiliency Practice and Theory
ent://SD_ILS/0/SD_ILS:484767
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Rieger, Craig. editor. Ray, Indrajit. editor. Zhu, Quanyan. editor. Haney, Michael A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proactive and Dynamic Network Defense
ent://SD_ILS/0/SD_ILS:486655
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Wang, Cliff. editor. Lu, Zhuo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Micro-Grid Systems Security and Privacy
ent://SD_ILS/0/SD_ILS:399573
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kayem, Anne V. D. M. editor. Wolthusen, Stephen D. editor. Meinel, Christoph. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Versatile Cybersecurity
ent://SD_ILS/0/SD_ILS:399974
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Somani, Gaurav. editor. Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Threat Intelligence
ent://SD_ILS/0/SD_ILS:400906
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Dehghantanha, Ali. editor. Conti, Mauro. editor. (orcid)0000-0002-3612-1934 Dargahi, Tooska. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Iris Biometrics From Segmentation to Template Security
ent://SD_ILS/0/SD_ILS:331810
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Rathgeb, Christian. author. Uhl, Andreas. author. Wild, Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331810.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Preserving Privacy in Data Outsourcing
ent://SD_ILS/0/SD_ILS:172941
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Foresti, Sara. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats
ent://SD_ILS/0/SD_ILS:173823
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Swarup, Vipin. editor. Wang, Cliff. editor. Wang, X. Sean. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection and Prevention Concepts and Techniques
ent://SD_ILS/0/SD_ILS:167906
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ghorbani, Ali A. author. Lu, Wei. author. Tavallaee, Mahbod. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encryption for Digital Content
ent://SD_ILS/0/SD_ILS:171850
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kiayias, Aggelos. author. Pehlivanoglu, Serdar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0044-9">http://dx.doi.org/10.1007/978-1-4419-0044-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primality Testing and Integer Factorization in Public-Key Cryptography
ent://SD_ILS/0/SD_ILS:167452
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Dependability for Ambient Intelligence
ent://SD_ILS/0/SD_ILS:167907
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kokolakis, Spyros. editor. Gómez, Antonio Maña. editor. Spanoudakis, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88775-3">http://dx.doi.org/10.1007/978-0-387-88775-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Identifying Malicious Code Through Reverse Engineering
ent://SD_ILS/0/SD_ILS:167947
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Singh, Abhishek. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Key Establishment
ent://SD_ILS/0/SD_ILS:167859
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Choo, Kim-Kwang Raymond. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87969-7">http://dx.doi.org/10.1007/978-0-387-87969-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Warehousing and Data Mining Techniques for Cyber Security
ent://SD_ILS/0/SD_ILS:166379
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptography Principles and Applications
ent://SD_ILS/0/SD_ILS:185185
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Delfs, Hans. author. Knebl, Helmut. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Formal Correctness of Security Protocols With 62 Figures and 4 Tables
ent://SD_ILS/0/SD_ILS:185368
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bella, Giampaolo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy in practice : establish and operationalize a holistic data privacy program
ent://SD_ILS/0/SD_ILS:560699
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Tang, Alan, (Information Security), author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence technology in healthcare : security and privacy issues
ent://SD_ILS/0/SD_ILS:574411
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Sharma, Neha (Computer scientist), editor. Srivastava, Durgesh (Computer scientist), editor. Sinwar, Deepak, editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2
ent://SD_ILS/0/SD_ILS:526849
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Xu, Zheng. editor. Alrabaee, Saed. editor. Loyola-González, Octavio. editor. Cahyani, Niken Dwi Wahyu. editor. Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1
ent://SD_ILS/0/SD_ILS:526850
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Xu, Zheng. editor. Alrabaee, Saed. editor. Loyola-González, Octavio. editor. Cahyani, Niken Dwi Wahyu. editor. Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-31860-3">https://doi.org/10.1007/978-3-031-31860-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next Generation of Internet of Things Proceedings of ICNGIoT 2022
ent://SD_ILS/0/SD_ILS:526873
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kumar, Raghvendra. editor. Pattnaik, Prasant Kumar. editor. R. S. Tavares, João Manuel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-1412-6">https://doi.org/10.1007/978-981-19-1412-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2022
ent://SD_ILS/0/SD_ILS:526883
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ranganathan, G. editor. Fernando, Xavier. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Data Analytics and Management ICDAM 2022
ent://SD_ILS/0/SD_ILS:527638
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Khanna, Ashish. editor. Polkowski, Zdzislaw. editor. Castillo, Oscar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7615-5">https://doi.org/10.1007/978-981-19-7615-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Technological Trends in the AI Economy International Review and Ways of Adaptation
ent://SD_ILS/0/SD_ILS:527596
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Makarenko, Elena N. editor. Vovchenko, Natalia G. editor. Tishchenko, Evgeny N. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7411-3">https://doi.org/10.1007/978-981-19-7411-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technology for Competitive Strategies (ICTCS 2022) ICT: Applications and Social Interfaces
ent://SD_ILS/0/SD_ILS:527746
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Joshi, Amit. editor. Mahmud, Mufti. editor. Ragel, Roshan G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9638-2">https://doi.org/10.1007/978-981-19-9638-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big Data and Cloud Computing Select Proceedings of ICBCC 2022
ent://SD_ILS/0/SD_ILS:527845
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Venkataraman, Neelanarayanan. editor. Wang, Lipo. editor. Fernando, Xavier. editor. Zobaa, Ahmed F. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1051-9">https://doi.org/10.1007/978-981-99-1051-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Conference on Frontiers in Computing and Systems COMSYS 2022
ent://SD_ILS/0/SD_ILS:527858
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Sarkar, Ram. editor. Pal, Sujata. editor. Basu, Subhadip. editor. Plewczynski, Dariusz. editor. Bhattacharjee, Debotosh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2680-0">https://doi.org/10.1007/978-981-99-2680-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 2
ent://SD_ILS/0/SD_ILS:527993
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Rathore, Vijay Singh. editor. Piuri, Vincenzo. editor. Babo, Rosalina. editor. Ferreira, Marta Campos. editor. (orcid)0000-0001-9505-5730 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1946-8">https://doi.org/10.1007/978-981-99-1946-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 1
ent://SD_ILS/0/SD_ILS:528126
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Weng, Shaowei. editor. Shieh, Chin-Shiuh. editor. (orcid)0000-0003-3187-458X Tsihrintzis, George A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0605-5">https://doi.org/10.1007/978-981-99-0605-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Challenges of Software Verification
ent://SD_ILS/0/SD_ILS:528145
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Arceri, Vincenzo. editor. Cortesi, Agostino. editor. Ferrara, Pietro. editor. Olliaro, Martina. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9601-6">https://doi.org/10.1007/978-981-19-9601-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
ent://SD_ILS/0/SD_ILS:528240
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Zantout, Hind. editor. Ragab Hassen, Hani. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-40598-3">https://doi.org/10.1007/978-3-031-40598-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023
ent://SD_ILS/0/SD_ILS:528415
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Giri, Debasis. editor. Gollmann, Dieter. editor. Ponnusamy, S. editor. Kouichi, Sakurai. editor. Stanimirović, Predrag S. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Computational and Communication Paradigms Proceedings of ICACCP 2023
ent://SD_ILS/0/SD_ILS:528431
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Borah, Samarjeet. editor. Gandhi, Tapan K. editor. Piuri, Vincenzo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-4284-8">https://doi.org/10.1007/978-981-99-4284-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in IoT and Security with Computational Intelligence Proceedings of ICAISA 2023, Volume 2
ent://SD_ILS/0/SD_ILS:528433
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Mishra, Anurag. editor. Gupta, Deepak. editor. Chetty, Girija. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-5088-1">https://doi.org/10.1007/978-981-99-5088-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in IoT and Security with Computational Intelligence Proceedings of ICAISA 2023, Volume 1
ent://SD_ILS/0/SD_ILS:528440
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Mishra, Anurag. editor. Gupta, Deepak. editor. Chetty, Girija. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-5085-0">https://doi.org/10.1007/978-981-99-5085-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1
ent://SD_ILS/0/SD_ILS:529010
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Singh, Yashwant. editor. Singh, Pradeep Kumar. editor. Kolekar, Maheshkumar H. editor. Kar, Arpan Kumar. editor. Gonçalves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2023
ent://SD_ILS/0/SD_ILS:529021
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ranganathan, G. editor. EL Allioui, Youssouf. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Data Analytics and Management ICDAM 2023, Volume 3
ent://SD_ILS/0/SD_ILS:529027
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Swaroop, Abhishek. editor. Polkowski, Zdzislaw. editor. Correia, Sérgio Duarte. editor. Virdee, Bal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-6550-2">https://doi.org/10.1007/978-981-99-6550-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Data Analytics and Management ICDAM 2023, Volume 4
ent://SD_ILS/0/SD_ILS:529039
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Swaroop, Abhishek. editor. Polkowski, Zdzislaw. editor. Correia, Sérgio Duarte. editor. Virdee, Bal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-6553-3">https://doi.org/10.1007/978-981-99-6553-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
ent://SD_ILS/0/SD_ILS:529055
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Schiffner, Stefan. editor. Ziegler, Sébastien. editor. (orcid)0000-0001-7255-4975 Jensen, Meiko. editor. (orcid)0009-0003-2397-9813 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Advances in Blockchain Technology Real-World Applications
ent://SD_ILS/0/SD_ILS:529096
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Panda, Sandeep Kumar. editor. Mishra, Vaibhav. editor. Dash, Sujata Priyambada. editor. Pani, Ashis Kumar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-22835-3">https://doi.org/10.1007/978-3-031-22835-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Economy in the Digital Age
ent://SD_ILS/0/SD_ILS:528763
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Shukla, Samiksha. author. Bisht, Kritica. author. Tiwari, Kapil. author. Bashir, Shahid. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-7677-5">https://doi.org/10.1007/978-981-99-7677-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications ICMISC 2022
ent://SD_ILS/0/SD_ILS:528784
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Gunjan, Vinit Kumar. editor. Zurada, Jacek M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-6088-8">https://doi.org/10.1007/978-981-19-6088-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Fourth International Conference on Computer and Communication Technologies IC3T 2022
ent://SD_ILS/0/SD_ILS:528786
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Reddy, K. Ashoka. editor. Devi, B. Rama. editor. George, Boby. editor. Raju, K. Srujan. editor. Sellathurai, Mathini. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-8563-8">https://doi.org/10.1007/978-981-19-8563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023
ent://SD_ILS/0/SD_ILS:528801
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Chaki, Nabendu. editor. Roy, Nilanjana Dutta. editor. Debnath, Papiya. editor. Saeed, Khalid. editor. (orcid)0000-0002-7741-7045 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3878-0">https://doi.org/10.1007/978-981-99-3878-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Explainable AI for Cybersecurity
ent://SD_ILS/0/SD_ILS:528936
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Pan, Zhixin. author. Mishra, Prabhat. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-46479-9">https://doi.org/10.1007/978-3-031-46479-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Trust and Privacy Models, and Architectures in IoT Environments
ent://SD_ILS/0/SD_ILS:526748
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Fotia, Lidia. editor. Messina, Fabrizio. editor. Rosaci, Domenico. editor. Sarné, Giuseppe M.L. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21940-5">https://doi.org/10.1007/978-3-031-21940-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fusion of Machine Learning Paradigms Theory and Applications
ent://SD_ILS/0/SD_ILS:526924
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Hatzilygeroudis, Ioannis K. editor. Tsihrintzis, George A. editor. Jain, Lakhmi C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-22371-6">https://doi.org/10.1007/978-3-031-22371-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Application Development: Practice and Experience 12th Industry Symposium in Conjunction with 18th ICDCIT 2022
ent://SD_ILS/0/SD_ILS:527017
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Singh, Jagannath. editor. Das, Debasish. editor. Kumar, Lov. editor. Krishna, Aneesh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-6893-8">https://doi.org/10.1007/978-981-19-6893-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Smart Home Networks
ent://SD_ILS/0/SD_ILS:527231
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Meng, Yan. author. Zhu, Haojin. author. Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-24185-7">https://doi.org/10.1007/978-3-031-24185-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and Identity Access Management
ent://SD_ILS/0/SD_ILS:527374
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Rawal, Bharat S. author. Manogaran, Gunasekaran. author. Peter, Alexender. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2
ent://SD_ILS/0/SD_ILS:527448
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kondo, Kazuhiro. editor. Horng, Mong-Fong. editor. Pan, Jeng-Shyang. editor. Hu, Pei. editor. (orcid)0000-0003-3711-4952 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0105-0">https://doi.org/10.1007/978-981-99-0105-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communication Technology for Competitive Strategies (ICTCS 2021) ICT: Applications and Social Interfaces
ent://SD_ILS/0/SD_ILS:527470
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Joshi, Amit. editor. Mahmud, Mufti. editor. Ragel, Roshan G. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-0095-2">https://doi.org/10.1007/978-981-19-0095-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Predictive Data Security using AI Insights and Issues of Blockchain, IoT, and DevOps
ent://SD_ILS/0/SD_ILS:527503
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Thakkar, Hiren Kumar. editor. Swarnkar, Mayank. editor. Bhadoria, Robin Singh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-6290-5">https://doi.org/10.1007/978-981-19-6290-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The NICE Cyber Security Framework Cyber Security Intelligence and Analytics
ent://SD_ILS/0/SD_ILS:527712
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Alsmadi, Izzat. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21651-0">https://doi.org/10.1007/978-3-031-21651-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovations in Data Analytics Selected Papers of ICIDA 2022
ent://SD_ILS/0/SD_ILS:527787
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. (orcid)0000-0002-1052-7055 Dutta, Paramartha. editor. Piuri, Vincenzo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0550-8">https://doi.org/10.1007/978-981-99-0550-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovations in Information and Communication Technologies Proceedings of ICIICT 2022
ent://SD_ILS/0/SD_ILS:528373
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Garg, Deepak. editor. Kumar, Neeraj. editor. Iqbal, Rahat. editor. Gupta, Suneet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-3796-5">https://doi.org/10.1007/978-981-19-3796-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence in Cyber Security: Theories and Applications
ent://SD_ILS/0/SD_ILS:528553
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Bhardwaj, Tushar. editor. Upadhyay, Himanshu. editor. Sharma, Tarun Kumar. editor. Fernandes, Steven Lawrence. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-28581-3">https://doi.org/10.1007/978-3-031-28581-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Computing and Applications Proceedings of ICDIC 2020
ent://SD_ILS/0/SD_ILS:528678
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Rao, B. Narendra Kumar. editor. Balasubramanian, R. editor. Wang, Shiuh-Jeng. editor. Nayak, Richi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022)
ent://SD_ILS/0/SD_ILS:528692
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Nedjah, Nadia. editor. Martínez Pérez, Gregorio. editor. Gupta, B. B. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-22018-0">https://doi.org/10.1007/978-3-031-22018-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1
ent://SD_ILS/0/SD_ILS:529113
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Rathore, Vijay Singh. editor. Tavares, João Manuel R. S. editor. Piuri, Vincenzo. editor. Surendiran, B. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author STACKPOLE, BILL.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security: Analytics, Technology and Automation
ent://SD_ILS/0/SD_ILS:529962
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing for Embedded Systems
ent://SD_ILS/0/SD_ILS:530149
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Candaele, Bernard. editor. Soudris, Dimitrios. editor. Anagnostopoulos, Iraklis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09420-5">https://doi.org/10.1007/978-3-319-09420-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detecting Peripheral-based Attacks on the Host Memory
ent://SD_ILS/0/SD_ILS:529268
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Stewin, Patrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13515-1">https://doi.org/10.1007/978-3-319-13515-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory
ent://SD_ILS/0/SD_ILS:529429
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11674-7">https://doi.org/10.1007/978-3-319-11674-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments
ent://SD_ILS/0/SD_ILS:529568
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Hausken, Kjell. editor. Zhuang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13009-5">https://doi.org/10.1007/978-3-319-13009-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Defense A Cybersecurity Primer
ent://SD_ILS/0/SD_ILS:530403
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Pelton, Joseph. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-19953-5">https://doi.org/10.1007/978-3-319-19953-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Network Hacks Attack and Defense with Python
ent://SD_ILS/0/SD_ILS:530100
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ballmann, Bastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44437-5">https://doi.org/10.1007/978-3-662-44437-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Mobile NFC Devices
ent://SD_ILS/0/SD_ILS:529509
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Roland, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Total information risk management maximizing the value of data and information assets
ent://SD_ILS/0/SD_ILS:306693
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Borek, Alexander.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enterprise architecture and information assurance : developing a secure foundation
ent://SD_ILS/0/SD_ILS:538768
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Scholz, James A., author.<br/>Preferred Shelf Number QA76.9 .D314 S34 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Responsive Security
ent://SD_ILS/0/SD_ILS:542438
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kang, Meng-Chow, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical risk management for the CIO
ent://SD_ILS/0/SD_ILS:541595
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Scherling, Mark., author.<br/>Preferred Shelf Number HF5548.37 .S34 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information warfare
ent://SD_ILS/0/SD_ILS:304069
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Ventre, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:543918
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number QA76.9 .A25 H52 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:544153
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Collette, Ronald D., author. Gentile, Michael. Gentile, Skye.<br/>Preferred Shelf Number HF5548.37 .G462 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:545167
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2006<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Assessing and managing security risk in IT systems : a structured methodology
ent://SD_ILS/0/SD_ILS:542250
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author McCumber, John, 1956, author.<br/>Preferred Shelf Number QA76.9 .A25 M4284 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135488970">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2026-01-17T18:00:29Z
2026-01-17T18:00:29Z
Author Kairab, Sudhanshu., author.<br/>Preferred Shelf Number HF5548.32 .K345 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>