Search Results for Information security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list
2026-01-17T18:20:15Z
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing information security
ent://SD_ILS/0/SD_ILS:306692
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:271272
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Smith, Richard E.<br/>Preferred Shelf Number QA76.9.A25 S652 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Strategic information security
ent://SD_ILS/0/SD_ILS:541272
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Wylder, John., author.<br/>Preferred Shelf Number TK5105.59 .W95 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203497081">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information Security Governance
ent://SD_ILS/0/SD_ILS:167709
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Solms, S.H. author. Solms, Rossouw. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-79984-1">http://dx.doi.org/10.1007/978-0-387-79984-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number QA76.9 .A25 P427 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security handbook
ent://SD_ILS/0/SD_ILS:584442
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Jhanjhi, Noor Zaman, 1972- editor. Hussain, Khalid, editor. Humayun, Mamoona, editor. Abdullah, Azween Bin, 1961- editor. Tavares, João Manuel R. S., editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367808228">https://www.taylorfrancis.com/books/9780367808228</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:542740
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author O'Hanley, Richard. Tiller, James S.<br/>Preferred Shelf Number HD61 .I54 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466567528">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Electronic Healthcare Information Security
ent://SD_ILS/0/SD_ILS:167753
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Shoniregun, Charles A. author. Dube, Kudakwashe. author. Mtenzi, Fredrick. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:540065
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Krause, Micki. Tipton, Harold F.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439833032">Click here to view.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:539327
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Krause, Micki. Tipton, Harold F.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135492335">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:539793
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:542831
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security and optimization
ent://SD_ILS/0/SD_ILS:556640
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tanwar, Rohit, editor. Choudhury, Tanupriya, editor. Zamani, Mazdak, editor. Gupta, Sunil, 1979- editor.<br/>Preferred Shelf Number QA76.9 .A25 I63 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:538782
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:546827
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420090956">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security : contemporary cases
ent://SD_ILS/0/SD_ILS:111021
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Wright, Marie A. Kakalik, John S.<br/>Preferred Shelf Number QA76.9.A25 W75 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Handbook of information security
ent://SD_ILS/0/SD_ILS:108909
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bidgoli, Hossein, ed.<br/>Preferred Shelf Number TK5105.59 H35 2006 V.1<br/>Format: Books<br/>Availability Beytepe Library~3<br/>
Information security for managers
ent://SD_ILS/0/SD_ILS:516570
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security cost management
ent://SD_ILS/0/SD_ILS:538817
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bazavan, Ioana V., author. Lim, Ian.<br/>Preferred Shelf Number QA76.9 .A25 B395 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013832">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information Security Management Handbook. Vol. 4.
ent://SD_ILS/0/SD_ILS:545829
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tipton, Harold F., editor Krause, Micki, editor CRC Press LLC.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429117367">https://www.taylorfrancis.com/books/9780429117367</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Legal issues in information security
ent://SD_ILS/0/SD_ILS:365418
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Grama, Joanna Lyn, author.<br/>Preferred Shelf Number KF1263.C65 G73 2011<br/>Format: Books<br/>Availability Law Library~1<br/>
Integration of Information for Environmental Security
ent://SD_ILS/0/SD_ILS:169859
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Coskun, H. Gonca. editor. Cigizoglu, H. Kerem. editor. Maktav, M. Derya. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4020-6575-0">http://dx.doi.org/10.1007/978-1-4020-6575-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:298878
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security a strategic approach
ent://SD_ILS/0/SD_ILS:249831
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author LeVeque, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:301803
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Stamp, Mark.<br/>Preferred Shelf Number QA76.9.A25 S69 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Blockchain for information security and privacy
ent://SD_ILS/0/SD_ILS:580861
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Rao, Udai Pratap, editor.<br/>Preferred Shelf Number QA76.9 .B56 B555 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003129486">https://www.taylorfrancis.com/books/9781003129486</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:459518
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security for Automatic Speaker Identification
ent://SD_ILS/0/SD_ILS:173281
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author El-Samie, Fathi E. Abd. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-9698-5">http://dx.doi.org/10.1007/978-1-4419-9698-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Information and Communication Security
ent://SD_ILS/0/SD_ILS:190841
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Stavroulakis, Peter. editor. Stamp, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:172736
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Moore, Tyler. editor. Pym, David. editor. Ioannidis, Christos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CyberForensics Understanding Information Security Investigations
ent://SD_ILS/0/SD_ILS:175048
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bayuk, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-60761-772-3">http://dx.doi.org/10.1007/978-1-60761-772-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Volume 4
ent://SD_ILS/0/SD_ILS:540034
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439819036">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Trinckes, John J., author.<br/>Preferred Shelf Number HF5548.37 .T75 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Volume 2
ent://SD_ILS/0/SD_ILS:543942
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420067101">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Managing Information Systems Security and Privacy
ent://SD_ILS/0/SD_ILS:181654
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Trček, Denis. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Volume 2
ent://SD_ILS/0/SD_ILS:546290
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135484002">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information Processing and Security Systems
ent://SD_ILS/0/SD_ILS:165266
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Saeed, Khalid. editor. Pejaś, Jerzy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137371">http://dx.doi.org/10.1007/b137371</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at managing information security
ent://SD_ILS/0/SD_ILS:253677
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Osborne, Mark. Summitt, Paul M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Manuscrypt : designed for mankind - anthropocentric information security
ent://SD_ILS/0/SD_ILS:579444
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Upadhyaya, Prashant A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003527220">https://www.taylorfrancis.com/books/9781003527220</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Creating an information security program from scratch
ent://SD_ILS/0/SD_ILS:576963
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number QA76.9 .A25 W55 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093688">https://www.taylorfrancis.com/books/9781003093688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developments in information security and cybernetic wars
ent://SD_ILS/0/SD_ILS:482187
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy III
ent://SD_ILS/0/SD_ILS:331294
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Schneier, Bruce. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331294.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:334810
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Böhme, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334810.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Information Security A Hands-on Approach
ent://SD_ILS/0/SD_ILS:195648
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Basin, David. author. Schaller, Patrick. author. Schläpfer, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24474-2">http://dx.doi.org/10.1007/978-3-642-24474-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bacik, Sandy., author.<br/>Preferred Shelf Number QA76.9 .A25 B335 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Computational Intelligence in Information Assurance and Security
ent://SD_ILS/0/SD_ILS:186171
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Nedjah, Nadia. editor. Abraham, Ajith. editor. Mourelle, Luiza de Macedo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71078-3">http://dx.doi.org/10.1007/978-3-540-71078-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:145680
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:112214
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information Assurance Security in the Information Environment
ent://SD_ILS/0/SD_ILS:175440
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Blyth, Andrew. author. Kovacich, Gerald L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Optical and Digital Techniques for Information Security
ent://SD_ILS/0/SD_ILS:165090
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Javidi, Bahram. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b105098">http://dx.doi.org/10.1007/b105098</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)
ent://SD_ILS/0/SD_ILS:165267
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Shoniregun, Charles A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security best practices 205 basic rules
ent://SD_ILS/0/SD_ILS:254779
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Stefanek, George L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook on CD-ROM
ent://SD_ILS/0/SD_ILS:547768
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Nozaki, Micki Krause. Tipton, Harold F.<br/>Preferred Shelf Number QA76.9 .A25 H36 2002<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781466515611">https://www.taylorfrancis.com/books/9781466515611</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Herrmann, Debra S., author.<br/>Preferred Shelf Number QA76.9 .A25 H47 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
GeoSpatial Visual Analytics Geographical Information Processing and Visual Analytics for Environmental Security
ent://SD_ILS/0/SD_ILS:204921
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Amicis, Raffaele De. editor. Stojanovic, Radovan. editor. Conti, Giuseppe. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-90-481-2899-0">http://dx.doi.org/10.1007/978-90-481-2899-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integration of information for environmental security : environmental security, information security, disaster forecast and prevention, water resources management
ent://SD_ILS/0/SD_ILS:113618
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author NATO Advanced Research Workshop on Integration of Information for Environmental Security (2006 : Istanbul, Turkey) Coskun, H. Gonca. Cigizoglu, H. Kerem. Maktav, M. Derya.<br/>Preferred Shelf Number TD170.2 .N38 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Building an information security awareness program defending against social engineering and technical threats
ent://SD_ILS/0/SD_ILS:355618
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Gardner, Bill (Bill G.) Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number ONLINE(355618.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security governance using artificial intelligence of things in smart environments
ent://SD_ILS/0/SD_ILS:567882
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Ouaissa, Mariyam, editor. Ouaissa, Mariya, editor. Hidar, Tarik, editor. Sachan, Ram Chandra, editor. Mittal, Akhil, editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003606307">https://www.taylorfrancis.com/books/9781003606307</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radical reporting : writing better audit, risk, compliance, and information security reports
ent://SD_ILS/0/SD_ILS:575435
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author James, Sara I., author.<br/>Preferred Shelf Number HF5719<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003422365">https://www.taylorfrancis.com/books/9781003422365</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Swarm Intelligence : Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security
ent://SD_ILS/0/SD_ILS:578577
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Reddy, V. Dinesh, 1985- editor. Hussain, Md Muzakkir, editor Singh, Priyanka, editor.<br/>Preferred Shelf Number Q337.3<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032693217">https://www.taylorfrancis.com/books/9781032693217</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
THEORISING CYBER (IN)SECURITY information, materiality, and entropic security.
ent://SD_ILS/0/SD_ILS:561001
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Fouad, Noran Shafik.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003454113">https://www.taylorfrancis.com/books/9781003454113</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum computing : a journey into the next frontier of information and communication security
ent://SD_ILS/0/SD_ILS:589045
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Hammoudeh, Mohammad, editor. Essa, Abdullah T., editor. Sherbeeni, Amro M., editor. Firth, Clinton M., editor. Essa, Abdullah S. (Abdullah Saad) editor.<br/>Preferred Shelf Number QA76.889<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003475286">https://www.taylorfrancis.com/books/9781003475286</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and EU law : adopting the network and information security directive
ent://SD_ILS/0/SD_ILS:591167
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Karathanasis, Theodoros, author.<br/>Preferred Shelf Number KJE6071 .K39 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032722764">https://www.taylorfrancis.com/books/9781032722764</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology security and risk management : inductive cases for information security
ent://SD_ILS/0/SD_ILS:562664
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Wingreen, Stephen C., editor. Samandari, Amelia, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521356
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Athanasopoulos, Elias. editor. Mennink, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-49187-0">https://doi.org/10.1007/978-3-031-49187-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521362
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Muthukkumarasamy, Vallipuram. editor. Sudarsan, Sithu D. editor. Shyamasundar, Rudrapatna K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-49099-6">https://doi.org/10.1007/978-3-031-49099-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:521366
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8721-4">https://doi.org/10.1007/978-981-99-8721-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:521367
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8727-6">https://doi.org/10.1007/978-981-99-8727-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV
ent://SD_ILS/0/SD_ILS:521368
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8730-6">https://doi.org/10.1007/978-981-99-8730-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V
ent://SD_ILS/0/SD_ILS:521369
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8733-7">https://doi.org/10.1007/978-981-99-8733-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI
ent://SD_ILS/0/SD_ILS:521370
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8736-8">https://doi.org/10.1007/978-981-99-8736-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VII
ent://SD_ILS/0/SD_ILS:521371
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8739-9">https://doi.org/10.1007/978-981-99-8739-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:521372
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8724-5">https://doi.org/10.1007/978-981-99-8724-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2023 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII
ent://SD_ILS/0/SD_ILS:521373
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Jian. editor. Steinfeld, Ron. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-8742-9">https://doi.org/10.1007/978-981-99-8742-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2022, Volume 3
ent://SD_ILS/0/SD_ILS:526885
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Dutta, Paramartha. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. Lai, Wen-Cheng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4676-9">https://doi.org/10.1007/978-981-19-4676-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022) Proceedings
ent://SD_ILS/0/SD_ILS:527772
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author García Bringas, Pablo. editor. Pérez García, Hilde. editor. Martínez de Pisón, Francisco Javier. editor. Villar Flecha, José Ramón. editor. Troncoso Lora, Alicia. editor. (orcid)0000-0002-9801-7999<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-18409-3">https://doi.org/10.1007/978-3-031-18409-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2022, Volume 2
ent://SD_ILS/0/SD_ILS:528773
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Dutta, Paramartha. editor. Chakrabarti, Satyajit. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. Shahnaz, Celia. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4052-1">https://doi.org/10.1007/978-981-19-4052-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2022, Volume 1
ent://SD_ILS/0/SD_ILS:528774
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Dutta, Paramartha. editor. Chakrabarti, Satyajit. editor. Bhattacharya, Abhishek. editor. Dutta, Soumi. editor. Piuri, Vincenzo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4193-1">https://doi.org/10.1007/978-981-19-4193-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security and Privacy 7th International Conference, ICISSP 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520501
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Mori, Paolo. editor. Lenzini, Gabriele. editor. Furnell, Steven. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-37807-2">https://doi.org/10.1007/978-3-031-37807-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520765
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Prabhu, Srikanth. editor. Pokhrel, Shiva Raj. editor. (orcid) Li, Gang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2264-2">https://doi.org/10.1007/978-981-99-2264-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520807
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author You, Ilsun. editor. Youn, Taek-Young. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-25659-2">https://doi.org/10.1007/978-3-031-25659-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520822
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Deng, Yi. editor. Yung, Moti. editor. (orcid) SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-26553-2">https://doi.org/10.1007/978-3-031-26553-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 17th International Conference, CRITIS 2022, Munich, Germany, September 14-16, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520990
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Hämmerli, Bernhard. editor. (orcid) Helmbrecht, Udo. editor. Hommel, Wolfgang. editor. Kunczik, Leonhard. editor. Pickl, Stefan. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-35190-7">https://doi.org/10.1007/978-3-031-35190-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:520995
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Simpson, Leonie. editor. Rezazadeh Baee, Mir Ali. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-35486-1">https://doi.org/10.1007/978-3-031-35486-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521115
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Shikata, Junji. editor. Kuzuno, Hiroki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-41326-1">https://doi.org/10.1007/978-3-031-41326-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - LATINCRYPT 2023 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521179
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Aly, Abdelrahaman. editor. Tibouchi, Mehdi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44469-2">https://doi.org/10.1007/978-3-031-44469-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521323
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Meng, Weizhi. editor. Yan, Zheng. editor. Piuri, Vincenzo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-7032-2">https://doi.org/10.1007/978-981-99-7032-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:520598
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Furnell, Steven. editor. Clarke, Nathan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-38530-8">https://doi.org/10.1007/978-3-031-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovative Security Solutions for Information Technology and Communications 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers.
ent://SD_ILS/0/SD_ILS:520859
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Doinea, Mihai. editor. Janicke, Helge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-32636-3">https://doi.org/10.1007/978-3-031-32636-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes, Cryptology and Information Security 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:520866
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author El Hajji, Said. editor. Mesnager, Sihem. editor. Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-33017-9">https://doi.org/10.1007/978-3-031-33017-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2022 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:520920
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Seo, Seung-Hyun. editor. Seo, Hwajeong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-29371-9">https://doi.org/10.1007/978-3-031-29371-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings
ent://SD_ILS/0/SD_ILS:521250
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Wang, Ding. editor. Yung, Moti. editor. (orcid) Liu, Zheli. editor. Chen, Xiaofeng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-7356-9">https://doi.org/10.1007/978-981-99-7356-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications
ent://SD_ILS/0/SD_ILS:527120
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tsihrintzis, George A. editor. Wang, Shiuh-Jeng. editor. Lin, Iuon-Chang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-05491-4">https://doi.org/10.1007/978-3-031-05491-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the International Conference on Intelligent Computing, Communication and Information Security ICICCIS 2022
ent://SD_ILS/0/SD_ILS:528020
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Devedzic, Vladan. editor. Agarwal, Basant. editor. Gupta, Mukesh Kumar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1373-2">https://doi.org/10.1007/978-981-99-1373-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023) Proceedings
ent://SD_ILS/0/SD_ILS:529123
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author García Bringas, Pablo. editor. Pérez García, Hilde. editor. (orcid)0000-0001-7112-1983 Martínez de Pisón, Francisco Javier. editor. (orcid)0000-0002-3063-7374 Martínez Álvarez, Francisco. editor. Troncoso Lora, Alicia. editor. (orcid)0000-0002-9801-7999<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-42519-6">https://doi.org/10.1007/978-3-031-42519-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI metaheuristics for information security in digital media
ent://SD_ILS/0/SD_ILS:561501
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Shastri, Apoorva S., editor. Singh, Mangal, editor. Kulkarni, Anand Jayant, editor. Siarry, Patrick, editor.<br/>Preferred Shelf Number HM1231<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003107767">https://www.taylorfrancis.com/books/9781003107767</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information, security and society in the COVID-19 pandemic
ent://SD_ILS/0/SD_ILS:562738
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Moch, Natalia, editor. Wereda, Wioletta Sylwia, editor. Stańczyk, Jerzy, editor.<br/>Preferred Shelf Number HM851<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003309772">https://www.taylorfrancis.com/books/9781003309772</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A comprehensive guide to information security management and audit
ent://SD_ILS/0/SD_ILS:581175
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Banoth, Rajkumar, author. Gugulothu, Narsimha, author. Godishala, Aruna Kranthi, author.<br/>Preferred Shelf Number HD38.7<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003322191">https://www.taylorfrancis.com/books/9781003322191</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CLIMATE SECURITY the role of knowledge and scientific information in the making of a nexus.
ent://SD_ILS/0/SD_ILS:591939
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Goldberg, Matti.<br/>Preferred Shelf Number QC903<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003451525">https://www.taylorfrancis.com/books/9781003451525</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
National security in the new world order : government and the technology of information
ent://SD_ILS/0/SD_ILS:568976
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Monti, Andrea, 1967- author. Wacks, Raymond, author.<br/>Preferred Shelf Number JF1525 .A8<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367809775">https://www.taylorfrancis.com/books/9780367809775</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to machine learning with applications in information security
ent://SD_ILS/0/SD_ILS:581034
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Stamp, Mark, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264873">https://www.taylorfrancis.com/books/9781003264873</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security analytics : a data centric approach to information security
ent://SD_ILS/0/SD_ILS:592471
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Khurana, Mehak, editor. Mahajan, Shilpa, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003206088">https://www.taylorfrancis.com/books/9781003206088</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:549396
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AUDITING INFORMATION AND CYBER SECURITY GOVERNANCE a controls-based approach.
ent://SD_ILS/0/SD_ILS:567234
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Davis, Robert E.<br/>Preferred Shelf Number HF5667<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003099673">https://www.taylorfrancis.com/books/9781003099673</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT GOVERNANCE AND INFORMATION SECURITY : guides, standards and frameworks.
ent://SD_ILS/0/SD_ILS:567328
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Maleh, Yassine, 1987- Sahid, Abdelkebir, 1983- Alazab, Mamoun, 1980- Belaissaoui, Mustapha, 1968-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003161998">https://www.taylorfrancis.com/books/9781003161998</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent trends in blockchain for information systems security and privacy
ent://SD_ILS/0/SD_ILS:576110
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tyagi, Amit Kumar, 1988- editor. Abraham, Ajith, 1968- editor.<br/>Preferred Shelf Number QA76.9 .B56<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003139737">https://www.taylorfrancis.com/books/9781003139737</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and employee behaviour : how to reduce risk through employee education, training and awareness
ent://SD_ILS/0/SD_ILS:590294
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author McIlwraith, Angus, author.<br/>Preferred Shelf Number HD30.38<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429281785">https://www.taylorfrancis.com/books/9780429281785</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:482982
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Zhang, Huanguo. editor. Zhao, Bo. editor. Yan, Fei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji
ent://SD_ILS/0/SD_ILS:483462
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Carlet, Claude. editor. Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534 Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483447
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Mori, Paolo. editor. (orcid)0000-0002-6618-0388 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Multimedia Information Security: Techniques and Applications
ent://SD_ILS/0/SD_ILS:483348
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Singh, Amit Kumar. editor. Mohan, Anand. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:483569
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483576
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483841
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2019 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484918
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Schwabe, Peter. editor. Thériault, Nicolas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30530-7">https://doi.org/10.1007/978-3-030-30530-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:484959
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:484960
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485283
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Jang, JinSoo. editor. (orcid)0000-0003-2070-2408 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485829
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 Huang, Xinyi. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2017 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486418
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lange, Tanja. editor. Dunkelman, Orr. editor. (orcid)0000-0001-5799-2635 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25283-0">https://doi.org/10.1007/978-3-030-25283-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483477
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484061
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484666
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751 Yagi, Takeshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486352
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941 Toma, Cristian. editor. (orcid)0000-0001-9316-7739 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483660
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Venter, Hein. editor. (orcid)0000-0002-3607-8630 Loock, Marianne. editor. (orcid)0000-0001-8005-716X Coetzee, Marijke. editor. (orcid)0000-0002-9157-3079 Eloff, Mariki. editor. (orcid)0000-0001-8997-7931 Eloff, Jan. editor. (orcid)0000-0003-4683-2198<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484509
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Garg, Deepak. editor. (orcid)0000-0002-0888-3093 Kumar, N. V. Narendra. editor. Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486956
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399972
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Su, Chunhua. editor. Kikuchi, Hiroaki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399995
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335 Scala, Antonio. editor. (orcid)0000-0002-3414-2686 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400194
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Chen, Liqun. editor. (orcid)0000-0003-2680-4907 Manulis, Mark. editor. (orcid)0000-0002-1512-9670 Schneider, Steve. editor. (orcid)0000-0001-8365-6993 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:399086
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197 Galbraith, Steven. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03329-3">https://doi.org/10.1007/978-3-030-03329-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:399923
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197 Galbraith, Steven. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03326-2">https://doi.org/10.1007/978-3-030-03326-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400111
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Inomata, Atsuo. editor. Yasuda, Kan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400052
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Naccache, David. editor. (orcid)0000-0002-8651-6555 Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Qing, Sihan. editor. Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620 Blanc, Gregory. editor. (orcid)0000-0001-8150-6617<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400830
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401486
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Mori, Paolo. editor. Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401614
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kim, Howon. editor. Kim, Dong-Chan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401682
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Kim, Taesoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Information Security A Competency-Based Education Course
ent://SD_ILS/0/SD_ILS:401941
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Alsmadi, Izzat. author. Burdwell, Robert. author. Aleroud , Ahmed. author. Wahbeh, Abdallah. author. Al-Qudah, Mahmoud. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401992
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Yang, Guomin. editor. (orcid)0000-0002-4949-7738 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402736
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201 Campegiani, Paolo. editor. Czachórski, Tadeusz. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Komnios, Ioannis. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Education – Towards a Cybersecure Society 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399019
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Drevin, Lynette. editor. (orcid)0000-0001-9370-8216 Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99734-6">https://doi.org/10.1007/978-3-319-99734-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:399545
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Peyrin, Thomas. editor. (orcid)0000-0002-2690-9197 Galbraith, Steven. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03332-3">https://doi.org/10.1007/978-3-030-03332-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400376
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Chen, Qingfeng. editor. Wu, Jia. editor. Zhang, Shichao. editor. Yuan, Changan. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400247
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Ganapathy, Vinod. editor. Jaeger, Trent. editor. Shyamasundar, R.K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400786
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Qing, Sihan. editor. Mitchell, Chris. editor. Chen, Liqun. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:402215
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Hancke, Gerhard P. editor. Damiani, Ernesto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Young, Carl S., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518770
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Foo, Ernest. editor. Stebila, Douglas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-19962-7">https://doi.org/10.1007/978-3-319-19962-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518785
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lin, Dongdai. editor. Yung, Moti. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-16745-9">https://doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518790
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lauter, Kristin. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-22174-8">https://doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17-19, 2014 Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518796
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Aranha, Diego F. editor. Menezes, Alfred. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-16295-9">https://doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519069
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lopez, Javier. editor. Mitchell, Chris J. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-23318-5">https://doi.org/10.1007/978-3-319-23318-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:519107
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Rhee, Kyung-Hyune. editor. Yi, Jeong Hyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15087-1">https://doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:519253
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lopez, Javier. editor. Wu, Yongdong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-17533-1">https://doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger
ent://SD_ILS/0/SD_ILS:519257
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author El Hajji, Said. editor. Nitaj, Abderrahmane. editor. Carlet, Claude. editor. Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18681-8">https://doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings
ent://SD_ILS/0/SD_ILS:519287
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-20376-8">https://doi.org/10.1007/978-3-319-20376-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings
ent://SD_ILS/0/SD_ILS:519325
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Akram, Raja Naeem. editor. Jajodia, Sushil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-24018-3">https://doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518355
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Camp, Olivier. editor. Weippl, Edgar. editor. Bidan, Christophe. editor. Aïmeur, Esma. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-27668-7">https://doi.org/10.1007/978-3-319-27668-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518386
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bishop, Matt. editor. Miloslavskaya, Natalia. editor. Theocharidou, Marianthi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18500-2">https://doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference
ent://SD_ILS/0/SD_ILS:518565
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-658-10934-9">https://doi.org/10.1007/978-3-658-10934-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518475
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Niu, Wenjia. editor. Li, Gang. editor. Liu, Jiqiang. editor. Tan, Jianlong. editor. Guo, Li. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-48683-2">https://doi.org/10.1007/978-3-662-48683-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security analytics finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:355388
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Preferred Shelf Number ONLINE(355388.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:518841
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Iwata, Tetsu. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-48797-6">https://doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
ent://SD_ILS/0/SD_ILS:518843
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tanaka, Keisuke. editor. Suga, Yuji. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-22425-1">https://doi.org/10.1007/978-3-319-22425-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:518845
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Desmedt, Yvo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-27659-5">https://doi.org/10.1007/978-3-319-27659-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings
ent://SD_ILS/0/SD_ILS:518854
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Jajoda, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-26961-0">https://doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518856
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Hui, Lucas C. K. editor. Qing, S. H. editor. Shi, Elaine. editor. Yiu, S. M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-21966-0">https://doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518872
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Ors, Berna. editor. Preneel, Bart. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-21356-9">https://doi.org/10.1007/978-3-319-21356-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:518911
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bica, Ion. editor. Naccache, David. editor. Simion, Emil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-27179-8">https://doi.org/10.1007/978-3-319-27179-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:518966
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Iwata, Tetsu. editor. Cheon, Jung Hee. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-48800-3">https://doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
ent://SD_ILS/0/SD_ILS:519003
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lehmann, Anja. editor. Wolf, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-17470-9">https://doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:519232
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lee, Jooyoung. editor. Kim, Jongsung. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-15943-0">https://doi.org/10.1007/978-3-319-15943-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Nanoscience Advances in CBRN Agents Detection, Information and Energy Security
ent://SD_ILS/0/SD_ILS:530213
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Petkov, Plamen. editor. Tsiulyanu, Dumitru. editor. Kulisch, Wilhelm. editor. Popov, Cyril. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-94-017-9697-2">https://doi.org/10.1007/978-94-017-9697-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:355770
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489108
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lin, Dongdai. editor. Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485793
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference
ent://SD_ILS/0/SD_ILS:487216
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488011
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Batten, Lynn. editor. Li, Gang. editor. (orcid)0000-0003-1583-641X Niu, Wenjia. editor. Warren, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488930
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ent://SD_ILS/0/SD_ILS:488956
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488986
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lee, Hyang-Sook. editor. Han, Dong-Guk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489016
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489055
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Teufel, Stephanie. editor. A Min, Tjoa. editor. You, Illsun. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485513
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Huang, Xinyi. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486887
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kim, Yongdae. editor. Lee, Heejo. editor. Perrig, Adrian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487278
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Mu, Yi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487372
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What Is Computer Science? An Information Security Perspective
ent://SD_ILS/0/SD_ILS:488536
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Page, Daniel. author. Smart, Nigel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:489420
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Padró, Carles. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489541
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Naccache, David. editor. Sauveron, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489545
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Prakash, Atul. editor. Shyamasundar, Rudrapatna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communication Technologies, Information Security and Sustainable Development Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486961
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Shaikh, Faisal Karim. editor. Chowdhry, Bhawani Shankar. editor. Zeadally, Sherali. editor. Hussain, Dil Muhammad Akbar. editor. Memon, Aftab Ahmed. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10987-9">https://doi.org/10.1007/978-3-319-10987-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security leader insights for information protection : lessons and strategies from leading security professionals
ent://SD_ILS/0/SD_ILS:355760
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Fahy, Bob, editor.<br/>Preferred Shelf Number ONLINE(355760.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008430">http://www.sciencedirect.com/science/book/9780128008430</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic intelligence management : national security imperatives and information and communications technologies
ent://SD_ILS/0/SD_ILS:270363
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Akhgar, Babak. Yates, Simeon.<br/>Preferred Shelf Number TK5102.85 A44 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:332941
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Qing, Sihan. editor. Zhou, Jianying. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332941.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334519
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Deng, Robert H. editor. Feng, Tao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334519.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334958
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Cuzzocrea, Alfredo. editor. Kittl, Christian. editor. Simos, Dimitris E. editor. Weippl, Edgar. editor. Xu, Lida. editor.<br/>Preferred Shelf Number ONLINE(334958.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335107
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bologna, Sandro. editor. Hämmerli, Bernhard. editor. Gritzalis, Dimitris. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335107.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:335110
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Hämmerli, Bernhard M. editor. Kalstad Svendsen, Nils. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335110.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41485-5">http://dx.doi.org/10.1007/978-3-642-41485-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems: Development, Learning, Security 6th SIGSAND/PLAIS EuroSymposium 2013, Gdańsk, Poland, September 26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335020
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Wrycza, Stanisław. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335020.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40855-7">http://dx.doi.org/10.1007/978-3-642-40855-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:335160
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:545128
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Williams, Barry L., author.<br/>Preferred Shelf Number QA76.9 .A25 .W5495 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:333008
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Luiijf, Eric. editor. Hartel, Pieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(333008.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334786
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Marinos, Louis. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334786.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334794
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Dodge, Ronald C. editor. Futcher, Lynn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334794.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334976
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Awad, Ali Ismail. editor. Hassanien, Aboul Ella. editor. Baba, Kensuke. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334976.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:335157
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:335098
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334720
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Boyd, Colin. editor. Simpson, Leonie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334720.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference
ent://SD_ILS/0/SD_ILS:335292
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335292.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing Risk and Information Security Protect to Enable
ent://SD_ILS/0/SD_ILS:330694
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Harkins, Malcolm. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330694.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334470
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kwon, Taekyoung. editor. Lee, Mun-Kyu. editor. Kwon, Daesung. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334470.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334613
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kutyłowski, Mirosław. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334613.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Protection in Information Processing Systems 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334755
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Janczewski, Lech J. editor. Wolfe, Henry B. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334755.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39218-4">http://dx.doi.org/10.1007/978-3-642-39218-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:335194
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bagchi, Aditya. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335194.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Technology Convergence Security, Robotics, Automations and Communication
ent://SD_ILS/0/SD_ILS:336345
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Park, James J. (Jong Hyuk). editor. Barolli, Leonard. editor. Xhafa, Fatos. editor. Jeong, Hwa-Young. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(336345.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-94-007-6996-0">http://dx.doi.org/10.1007/978-94-007-6996-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PRAGMATIC security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:541797
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Brotby, W. Krag., author. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number HD30.38 .B76 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-level
ent://SD_ILS/0/SD_ILS:195011
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Boehm, Franziska. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22392-1">http://dx.doi.org/10.1007/978-3-642-22392-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196738
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Laud, Peeter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29615-4">http://dx.doi.org/10.1007/978-3-642-29615-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196303
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Aura, Tuomas. editor. Järvinen, Kimmo. editor. Nyberg, Kaisa. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27937-9">http://dx.doi.org/10.1007/978-3-642-27937-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196995
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Askoxylakis, Ioannis. editor. Pöhls, Henrich C. editor. Posegga, Joachim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30955-7">http://dx.doi.org/10.1007/978-3-642-30955-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197080
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Susilo, Willy. editor. Mu, Yi. editor. Seberry, Jennifer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197153
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kim, Howon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-31912-9">http://dx.doi.org/10.1007/978-3-642-31912-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197201
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Smith, Adam. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32284-6">http://dx.doi.org/10.1007/978-3-642-32284-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multidisciplinary Research and Practice for Information Systems IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197227
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Quirchmayr, Gerald. editor. Basl, Josef. editor. You, Ilsun. editor. Xu, Lida. editor. Weippl, Edgar. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-32498-7">http://dx.doi.org/10.1007/978-3-642-32498-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197475
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197478
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Chim, Tat Wing. editor. Yuen, Tsz Hon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34129-8">http://dx.doi.org/10.1007/978-3-642-34129-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197541
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Wu, Chuan-Kun. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197559
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197566
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Venkatakrishnan, Venkat. editor. Goswami, Diganta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35130-3">http://dx.doi.org/10.1007/978-3-642-35130-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2012 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2012 Conference
ent://SD_ILS/0/SD_ILS:197662
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-658-00333-3">http://dx.doi.org/10.1007/978-3-658-00333-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196291
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Jung, Souhwan. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27890-7">http://dx.doi.org/10.1007/978-3-642-27890-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195894
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bouvry, Pascal. editor. Kłopotek, Mieczysław A. editor. Leprévost, Franck. editor. Marciniak, Małgorzata. editor. Mykowiecka, Agnieszka. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196613
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Ryan, Mark D. editor. Smyth, Ben. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-29101-2">http://dx.doi.org/10.1007/978-3-642-29101-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:196850
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Prasad, Ramjee. editor. Farkas, Károly. editor. Schmidt, Andreas U. editor. Lioy, Antonio. editor. Russello, Giovanni. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30244-2">http://dx.doi.org/10.1007/978-3-642-30244-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:196886
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Gritzalis, Dimitris. editor. Furnell, Steven. editor. Theoharidou, Marianthi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-30436-1">http://dx.doi.org/10.1007/978-3-642-30436-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197365
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Gollmann, Dieter. editor. Freiling, Felix C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33383-5">http://dx.doi.org/10.1007/978-3-642-33383-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197367
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Schmidt, Andreas U. editor. Russello, Giovanni. editor. Krontiris, Ioannis. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197384
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Hevia, Alejandro. editor. Neven, Gregory. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33481-8">http://dx.doi.org/10.1007/978-3-642-33481-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197580
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lei, Jingsheng. editor. Wang, Fu Lee. editor. Li, Mo. editor. Luo, Yuan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197604
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lee, Dong Hoon. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35416-8">http://dx.doi.org/10.1007/978-3-642-35416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security governance simplified : from the boardroom to the keyboard
ent://SD_ILS/0/SD_ILS:541952
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Fitzgerald, Todd., author.<br/>Preferred Shelf Number TK5105.59 .F58 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439811658">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics
ent://SD_ILS/0/SD_ILS:247542
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Deibert, Ronald. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193686
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Jha, Somesh. editor. Mathuria, Anish. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17714-9">http://dx.doi.org/10.1007/978-3-642-17714-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193823
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Burmester, Mike. editor. Tsudik, Gene. editor. Magliveras, Spyros. editor. Ilić, Ivana. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195047
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Parampalli, Udaya. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22497-3">http://dx.doi.org/10.1007/978-3-642-22497-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195771
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lai, Xuejia. editor. Zhou, Jianying. editor. Li, Hui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24861-0">http://dx.doi.org/10.1007/978-3-642-24861-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195888
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Qing, Sihan. editor. Susilo, Willy. editor. Wang, Guilin. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25243-3">http://dx.doi.org/10.1007/978-3-642-25243-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:196121
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Fang, Wai-chi. editor. Villalba, Javier García. editor. Arnett, Kirk P. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-27189-2">http://dx.doi.org/10.1007/978-3-642-27189-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Challenges in Security and Privacy for Academia and Industry 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194696
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Camenisch, Jan. editor. Fischer-Hübner, Simone. editor. Murayama, Yuko. editor. Portmann, Armand. editor. Rieder, Carlos. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21424-0">http://dx.doi.org/10.1007/978-3-642-21424-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194466
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Fehr, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-20728-0">http://dx.doi.org/10.1007/978-3-642-20728-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:194726
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lai, Xuejia. editor. Yung, Moti. editor. Lin, Dongdai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21518-6">http://dx.doi.org/10.1007/978-3-642-21518-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194568
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bao, Feng. editor. Weng, Jian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21031-0">http://dx.doi.org/10.1007/978-3-642-21031-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194571
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Ardagna, Claudio A. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21040-2">http://dx.doi.org/10.1007/978-3-642-21040-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195249
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kim, Tai-hoon. editor. Adeli, Hojjat. editor. Robles, Rosslin John. editor. Balitanas, Maricel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability and Security for Business, Enterprise and Health Information Systems IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195302
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tjoa, A Min. editor. Quirchmayr, Gerald. editor. You, Ilsun. editor. Xu, Lida. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23300-5">http://dx.doi.org/10.1007/978-3-642-23300-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195578
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Rhee, Kyung-Hyune. editor. Nyang, DaeHun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24209-0">http://dx.doi.org/10.1007/978-3-642-24209-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Aspects in Information Technology First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195683
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Joye, Marc. editor. Mukhopadhyay, Debdeep. editor. Tunstall, Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24586-2">http://dx.doi.org/10.1007/978-3-642-24586-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195931
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
ent://SD_ILS/0/SD_ILS:195982
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Jajodia, Sushil. editor. Mazumdar, Chandan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Risk Management Risikomanagement mit ISO/IEC 27001, 27005 und 31010
ent://SD_ILS/0/SD_ILS:199932
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Klipper, Sebastian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9870-8">http://dx.doi.org/10.1007/978-3-8348-9870-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security risk management building an information security risk management program from the ground up
ent://SD_ILS/0/SD_ILS:149172
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Wheeler, Evan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193265
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bao, Feng. editor. Yung, Moti. editor. Lin, Dongdai. editor. Jing, Jiwu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16342-5">http://dx.doi.org/10.1007/978-3-642-16342-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193761
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Chung, Yongwha. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17955-6">http://dx.doi.org/10.1007/978-3-642-17955-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:194663
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Herrero, Álvaro. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers
ent://SD_ILS/0/SD_ILS:194786
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Xenakis, Christos. editor. Wolthusen, Stephen. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-21694-7">http://dx.doi.org/10.1007/978-3-642-21694-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2010 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2010 Conference
ent://SD_ILS/0/SD_ILS:199891
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Pohlmann, Norbert. editor. Reimer, Helmut. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-9788-6">http://dx.doi.org/10.1007/978-3-8348-9788-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical-Layer Security From Information Theory to Security Engineering
ent://SD_ILS/0/SD_ILS:238465
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Bloch, Matthieu. Barros, João.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511977985">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Readings and cases in information security : law and ethics
ent://SD_ILS/0/SD_ILS:267743
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Whitman, Michael E. Mattord, Herbert J.<br/>Preferred Shelf Number TK5105.878 W54 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191714
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Weerasinghe, Dasun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11530-1">http://dx.doi.org/10.1007/978-3-642-11530-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191973
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Samarati, Pierangela. editor. Tunstall, Michael. editor. Posegga, Joachim. editor. Markantonakis, Konstantinos. editor. Sauveron, Damien. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192123
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kwak, Jin. editor. Deng, Robert H. editor. Won, Yoojae. editor. Wang, Guilin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12827-1">http://dx.doi.org/10.1007/978-3-642-12827-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:192544
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Steinfeld, Ron. editor. Hawkes, Philip. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14081-5">http://dx.doi.org/10.1007/978-3-642-14081-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193582
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:193620
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Schmidt, Andreas U. editor. Russello, Giovanni. editor. Lioy, Antonio. editor. Prasad, Neeli R. editor. Lian, Shiguo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193653
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Kim, Tai-hoon. editor. Fang, Wai-chi. editor. Khan, Muhammad Khurram. editor. Arnett, Kirk P. editor. Kang, Heau-jo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:193666
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Soriano, Miguel. editor. Qing, Sihan. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17650-0">http://dx.doi.org/10.1007/978-3-642-17650-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers
ent://SD_ILS/0/SD_ILS:192634
2026-01-17T18:20:15Z
2026-01-17T18:20:15Z
Author Rome, Erich. editor. Bloomfield, Robin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14379-3">http://dx.doi.org/10.1007/978-3-642-14379-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>