Search Results for Internet -- Security measures.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInternet$002b--$002bSecurity$002bmeasures.$0026pe$003dd$00253A$0026ps$003d300$0026isd$003dtrue?dt=list2024-12-30T22:17:39ZCryptographic security solutions for the internet of thingsent://SD_ILS/0/SD_ILS:4817712024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Banday, Mohammad Tariq, 1969- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial intelligence and security challenges in emerging networksent://SD_ILS/0/SD_ILS:4819752024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning and cognitive science applications in cyber securityent://SD_ILS/0/SD_ILS:4821512024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:4590442024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Sammons, John, author. Cross, Michael, 1965- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:4591002024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Macaulay, Tyson, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199712">http://www.sciencedirect.com/science/book/9780124199712</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:4589532024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:3555142024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355514.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Wiley handbook of psychology, technology and societyent://SD_ILS/0/SD_ILS:3871292024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Cheever, Nancy A., editor. Rosen, Larry D., editor. Carrier, L. Mark, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1002/9781118771952">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing VoIP : keeping your VoIP network safeent://SD_ILS/0/SD_ILS:3554172024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Bates, Regis J. author.<br/>Preferred Shelf Number ONLINE(355417.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Securityent://SD_ILS/0/SD_ILS:3421682024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:3554502024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:3566572024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Peng, Kun, author.<br/>Preferred Shelf Number ONLINE(356657.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Chinese cybersecurity and cyberdefenseent://SD_ILS/0/SD_ILS:3421552024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Ventre, Daniel.<br/>Preferred Shelf Number ONLINE(342155.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a>
MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:3066912024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in cyber security technology, operations, and experiencesent://SD_ILS/0/SD_ILS:2395912024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Jakobsson, Markus.<br/>Preferred Shelf Number TK5105.875.I57 D43 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:2852492024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Paul, Goutam. Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:1460562024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:1452542024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle Fusion middleware 11g architecture and managementent://SD_ILS/0/SD_ILS:2932522024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security strategies in Web applications and social networkingent://SD_ILS/0/SD_ILS:2715382024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Harwood, Mike.<br/>Preferred Shelf Number HM742 H38 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Secure Java for web application developmentent://SD_ILS/0/SD_ILS:2851662024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Bhargav, Abhay. Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439823569">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of financial cryptography and securityent://SD_ILS/0/SD_ILS:2878292024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Rosenberg, Burton.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Host Identity Protocol (HIP) towards the secure mobile Internetent://SD_ILS/0/SD_ILS:3028022024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Gurtov, Andrei.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470772898">http://dx.doi.org/10.1002/9780470772898</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>İnternet kullanımı ve aileent://SD_ILS/0/SD_ILS:1399012024-12-30T22:17:39Z2024-12-30T22:17:39ZPreferred Shelf Number TK5105.888 .I58 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:1150802024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor İnan, Yüksel. Demirli, Nihat.<br/>Preferred Shelf Number TK5105.59 .I536 2008<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Wireless Internet Security Architecture and Protocolsent://SD_ILS/0/SD_ILS:2362052024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Kempf, James.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511754739">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The future of the internet and how to stop itent://SD_ILS/0/SD_ILS:1349462024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Zittrain, Jonathan L.<br/>Preferred Shelf Number TK5105.875.I57 Z53 2008<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Asterisk hackingent://SD_ILS/0/SD_ILS:1453552024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Brashars, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1454862024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Porter, Thomas, PhD. Gough, Michael, 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1121062024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Porter, Thomas, PhD. Gough, Michael. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:2536692024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Porter, Thomas.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at configuring ISA server 2004ent://SD_ILS/0/SD_ILS:2539482024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Shinder, Thomas W. Shinder, Debra Littlejohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:1458402024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Bradley, Tony, 1969- Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Wyler, Neil R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>VoIP securityent://SD_ILS/0/SD_ILS:2537152024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Ransome, James F. Rittinghouse, John W.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet security a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:2538432024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Speed, Tim. Ellis, Juanita.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure Internet practices best practices for securing systems in the Internet and e-Business ageent://SD_ILS/0/SD_ILS:2904272024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor McBride, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031478">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your e-commerce site the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:2539682024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Russell, Ryan. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:2539692024-12-30T22:17:39Z2024-12-30T22:17:39ZAuthor Traxler, Julie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>