Search Results for New - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dNew$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2026-02-22T19:40:06ZTechnology and privacy : the new landscapeent://SD_ILS/0/SD_ILS:1129992026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Agre, Philip. Rotenberg, Marc.<br/>Preferred Shelf Number QA76.9.A25 T43 2001<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Honeypot : a new paradigm to information securityent://SD_ILS/0/SD_ILS:5455902026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security awareness design in the new normal ageent://SD_ILS/0/SD_ILS:5858132026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Goucher, Wendy, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003194583">https://www.taylorfrancis.com/books/9781003194583</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Controlling Privacy and the Use of Data Assets. Volume 1, Who Owns the New Oil?.ent://SD_ILS/0/SD_ILS:5558522026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Mattsson, Ulf.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/e/9781003189664">https://www.taylorfrancis.com/books/e/9781003189664</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4834962026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Li, Jin. editor. Liu, Zheli. editor. Peng, Hao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4849082026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>New Trends in Computer Technologies and Applications 23rd International Computer Symposium, ICS 2018, Yunlin, Taiwan, December 20–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4849382026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Chang, Chuan-Yu. editor. Lin, Chien-Chou. editor. Lin, Horng-Horng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-9190-3">https://doi.org/10.1007/978-981-13-9190-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4863792026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4863802026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4865762026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24265-7">https://doi.org/10.1007/978-3-030-24265-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>e-Citizens Toward a New Model of (Inter)active Citizenryent://SD_ILS/0/SD_ILS:4851942026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Ronchi, Alfredo M. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00746-1">https://doi.org/10.1007/978-3-030-00746-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4866362026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4869562026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:3992502026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor NG, Chee Keong. author. Pan, Lei. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:3995912026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3998602026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Galinina, Olga. editor. (orcid)0000-0002-5386-1061 Andreev, Sergey. editor. (orcid)0000-0001-8223-3665 Balandin, Sergey. editor. (orcid)0000-0003-3238-4830 Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3999042026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971 Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:4005082026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Wan, Jiafu. editor. Lin, Kai. editor. Zeng, Delu. editor. Li, Jin. editor. Xiang, Yang. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4025462026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Chong, Peter Han Joo. editor. Seet, Boon-Chong. editor. Chai, Michael. editor. Rehman, Saeed Ur. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dynamic Logic. New Trends and Applications First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4023212026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Madeira, Alexandre. editor. (orcid)0000-0002-0646-2017 Benevides, Mário. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-73579-5">https://doi.org/10.1007/978-3-319-73579-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4890682026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Meier, Willi. editor. Mukhopadhyay, Debdeep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:4896032026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Shi, Yun Qing. editor. Kim, Hyoung-Joong. editor. Pérez-González, Fernando. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ATTACKS ON ARTIFICIAL INTELLIGENCE the new facets of cyber.ent://SD_ILS/0/SD_ILS:5523132026-02-22T19:40:06Z2026-02-22T19:40:06ZPreferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003498827">https://www.taylorfrancis.com/books/9781003498827</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1460552026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Mao, Wenji. Wang, Fei-Yue.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The techno-legal dynamics of cyber crimes in Industry 5.0ent://SD_ILS/0/SD_ILS:5998012026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Quantum computing models for cybersecurity and wireless communicationsent://SD_ILS/0/SD_ILS:5997072026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Taming the hacking storm : a framework for securing and defending networksent://SD_ILS/0/SD_ILS:5998582026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352289</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Generative AI, cybersecurity, and ethicsent://SD_ILS/0/SD_ILS:5995972026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Next-generation systems and secure computingent://SD_ILS/0/SD_ILS:5997792026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Barman, Subhabrata, editor. Koley, Santanu, editor. Joardar, Subhankar, editor.<br/>Preferred Shelf Number QA76.9 .A25 N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.ent://SD_ILS/0/SD_ILS:5992382026-02-22T19:40:06Z2026-02-22T19:40:06ZPreferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The DevSecOps playbook : deliver continuous security at speedent://SD_ILS/0/SD_ILS:5986342026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stepping through cybersecurity risk management : a systems thinking approachent://SD_ILS/0/SD_ILS:5990212026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Bayuk, Jennifer L., author.<br/>Preferred Shelf Number QA76.9 .A25 B39 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Operations : A Case Study Approachent://SD_ILS/0/SD_ILS:5991172026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless communication in cyber securityent://SD_ILS/0/SD_ILS:5987052026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sustainably investing in digital assets globallyent://SD_ILS/0/SD_ILS:5977642026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Ozelli, Selva, author.<br/>Preferred Shelf Number HG4515.15 .O38 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Quantum computing in cybersecurityent://SD_ILS/0/SD_ILS:5986852026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Rawat, Romil, editor.<br/>Preferred Shelf Number QA76.9 .A25 Q83 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime during the SARS-CoV-2 pandemic (2019-2022)ent://SD_ILS/0/SD_ILS:5985172026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Ventre, Daniel, editor. Loiseau, Hugo, 1974- editor.<br/>Preferred Shelf Number HV6773 .C93 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394226344</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:5974842026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust-based communication systems for internet of things applicationsent://SD_ILS/0/SD_ILS:5977442026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:5971422026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Bursell, Mike, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5973262026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity in smart homes : architectures, solutions and technologiesent://SD_ILS/0/SD_ILS:5976262026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, regulations, and cybersecurity : the essential business guideent://SD_ILS/0/SD_ILS:5964722026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>VMware® Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 : study guideent://SD_ILS/0/SD_ILS:5962892026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Hall, Jon, 1963- author. Andrews, Joshua, author.<br/>Preferred Shelf Number QA76.9 .V5<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119539698</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security issues and privacy concerns in Industry 4.0 applicationsent://SD_ILS/0/SD_ILS:5969452026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial intelligence and data mining approaches in security frameworksent://SD_ILS/0/SD_ILS:5969572026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security engineering : a guide to building dependable distributed systemsent://SD_ILS/0/SD_ILS:5964802026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Anderson, Ross. http://viaf.org/viaf/sourceID/LC%7cnb2004300232<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied incident responseent://SD_ILS/0/SD_ILS:5957442026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:5962762026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Carey, Marcus J. (Cybersecurity professional) Jin, Jennifer.<br/>Preferred Shelf Number QA76.9 .A25 C3673 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:5953042026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Carpenter, Perry, author.<br/>Preferred Shelf Number QA76.9 .A25 C37 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119566380</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:5952092026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:5954152026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Carey, Marcus J. (Cybersecurity professional), author. Jin, Jennifer, author.<br/>Preferred Shelf Number QA76.9 .A25 C368 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:5954322026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Schneier, Bruce, 1963- author.<br/>Preferred Shelf Number QA76.9 .A25 S36 2019<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:5949672026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor McDonough, Bart R., author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensicsent://SD_ILS/0/SD_ILS:5933462026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social engineering : the science of human hackingent://SD_ILS/0/SD_ILS:5946352026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Hadnagy, Christopher, author.<br/>Preferred Shelf Number HM668 .H33 2018<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity essentialsent://SD_ILS/0/SD_ILS:5947562026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:5439182026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number QA76.9 .A25 H52 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Codes : the guide to secrecy from ancient to modern timesent://SD_ILS/0/SD_ILS:5460622026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number QA76.9 .A25 M67 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420035087">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Cryptography, information theory, and error-correction : a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:5930442026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Preferred Shelf Number QA76.9 .A25 B79 2005<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure computers and networks : analysis, design, and implementationent://SD_ILS/0/SD_ILS:5405682026-02-22T19:40:06Z2026-02-22T19:40:06ZAuthor Fisch, Eric A. White, Gregory B.<br/>Preferred Shelf Number QA76.9 .A25 F5334 2000<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>