Search Results for S. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dS.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-19T11:33:51Z Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:286402 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application security a beginner's guide ent://SD_ILS/0/SD_ILS:293241 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Sullivan, Bryan, 1974-&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:147664 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Cross, Michael, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:306464 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Cross, Michael, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489005 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Benaloh, Josh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The hacker's guide to OS X exploiting OS X from the root up ent://SD_ILS/0/SD_ILS:148006 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Bathurst, Robert.&#160;Rogers, Russ.&#160;Ghassemlouei, Alijohn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:146715 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:306330 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:148564 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Wiles, Jack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:148641 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Wiles, Jack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:112203 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Wiles, Jack.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber spying tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:253673 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Fair, Ted.&#160;Nordfelt, Michael.&#160;Ring, Sandra.&#160;Cole, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policies and procedures a practitioner's reference ent://SD_ILS/0/SD_ILS:290137 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:254024 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Burton, James.&#160;Dubrawsky, Ida.&#160;Osipov, Vitaly.&#160;Baumrucker, C. Tate.&#160;Sweeney, Michael<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows 7 ent://SD_ILS/0/SD_ILS:293477 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/windows-7-quicksteps">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows 7 SP1 ent://SD_ILS/0/SD_ILS:293421 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/windows-7-sp1-quicksteps">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows 7 for seniors ent://SD_ILS/0/SD_ILS:293424 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/windows-7-for-seniors-quicksteps">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International Conference on Computer Networks and Communication Technologies ICCNCT 2018 ent://SD_ILS/0/SD_ILS:486813 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Smys, S. editor.&#160;Bestak, Robert. editor.&#160;Chen, Joy Iong-Zong. editor.&#160;Kotuliak, Ivan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8681-6">https://doi.org/10.1007/978-981-10-8681-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and resilient software requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:290799 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Merkow, Mark S.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439866221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:290714 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Merkow, Mark S.&#160;Raghavan, Lakshmikanth.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439826973">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:290461 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Herrmann, Debra S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:290436 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Held, Jonathan S.&#160;Bowers, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031553">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Countering cyber attacks and preserving the integrity and availability of critical systems ent://SD_ILS/0/SD_ILS:482177 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Geetha, S., 1979- editor.&#160;Phamila, Asnath Victy, 1978- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26&ndash;28, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483527 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34866-3">https://doi.org/10.1007/978-3-030-34866-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovations in Computer Science and Engineering Proceedings of the Fifth ICICSE 2017 ent://SD_ILS/0/SD_ILS:487299 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Saini, H. S. editor.&#160;Sayal, Rishi. editor.&#160;Govardhan, A. editor.&#160;Buyya, Rajkumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8201-6">https://doi.org/10.1007/978-981-10-8201-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24&ndash;26, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483667 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Biagioni, Edoardo S. editor.&#160;Zheng, Yao. editor.&#160;Cheng, Siyao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper ent://SD_ILS/0/SD_ILS:484505 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Obaidat, Mohammad S. editor.&#160;Cabello, Enrique. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovations in Computer Science and Engineering Proceedings of the Sixth ICICSE 2018 ent://SD_ILS/0/SD_ILS:486768 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Saini, H. S. editor.&#160;Sayal, Rishi. editor.&#160;Govardhan, Aliseri. editor.&#160;Buyya, Rajkumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-7082-3">https://doi.org/10.1007/978-981-13-7082-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday ent://SD_ILS/0/SD_ILS:486859 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Alvim, M&aacute;rio S. editor.&#160;Chatzikokolakis, Kostas. editor.&#160;Olarte, Carlos. editor.&#160;Valencia, Frank. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometric-Based Physical and Cybersecurity Systems ent://SD_ILS/0/SD_ILS:484246 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Obaidat, Mohammad S. editor.&#160;Traore, Issa. editor. (orcid)0000-0003-2987-8047&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98734-7">https://doi.org/10.1007/978-3-319-98734-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Data Storage Aspect in Cloud Computing ent://SD_ILS/0/SD_ILS:484576 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Deshpande, Prachi S. author.&#160;Sharma, Subhash C. author.&#160;Peddoju, Sateesh K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-6089-3">https://doi.org/10.1007/978-981-13-6089-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:458968 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Young, Carl S., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Sketch-Based Passwords A General Framework ent://SD_ILS/0/SD_ILS:487393 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Riggan, Benjamin S. author.&#160;Snyder, Wesley E. author.&#160;Wang, Cliff. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488647 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Obaidat, Mohammad S. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44788-8">https://doi.org/10.1007/978-3-662-44788-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482710 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Obaidat, Mohammad S. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44791-8">https://doi.org/10.1007/978-3-662-44791-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:145680 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Winkler, Ira.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:253989 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Beale, Jay.&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:253991 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Deraison, Renaud.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications ent://SD_ILS/0/SD_ILS:400016 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Rao, Nageswara S.V. editor.&#160;Brooks, Richard R. editor.&#160;Wu, Chase Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485793 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Chow, Sherman S.M. editor.&#160;Camenisch, Jan. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet Science 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24&ndash;26, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400254 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Bodrunova, Svetlana S. editor. (orcid)0000-0003-0740-561X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01437-7">https://doi.org/10.1007/978-3-030-01437-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Preferred Shelf Number&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Recent Trends in Image Processing and Pattern Recognition Second International Conference, RTIP2R 2018, Solapur, India, December 21&ndash;22, 2018, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:483285 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Santosh, K. C. editor.&#160;Hegadi, Ravindra S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-9187-3">https://doi.org/10.1007/978-981-13-9187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 &ndash; November 1, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487069 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239&#160;Vorobeychik, Yevgeniy. editor. (orcid)0000-0003-2471-5345&#160;Baras, John S. editor. (orcid)0000-0002-4955-8561&#160;D&aacute;n, Gy&ouml;rgy. editor. (orcid)0000-0002-4876-0223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainable Interdependent Networks II From Smart Power Grids to Intelligent Transportation Networks ent://SD_ILS/0/SD_ILS:484747 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Amini, M. Hadi. editor.&#160;Boroojeni, Kianoosh G. editor.&#160;Iyengar, S. S. editor.&#160;Pardalos, Panos M. editor. (orcid)0000-0003-2824-101X&#160;Blaabjerg, Frede. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98923-5">https://doi.org/10.1007/978-3-319-98923-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Speech Enhancement Techniques for Digital Hearing Aids ent://SD_ILS/0/SD_ILS:482802 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Borisagar, Komal R. author.&#160;Thanki, Rohit M. author. (orcid)0000-0002-0645-6266&#160;Sedani, Bhavin S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International Conference on Advanced Computing Networking and Informatics ICANI-2018 ent://SD_ILS/0/SD_ILS:486202 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Kamal, Raj. editor.&#160;Henshaw, Michael. editor.&#160;Nair, Pramod S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2673-8">https://doi.org/10.1007/978-981-13-2673-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399609 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Phung, Dinh. editor.&#160;Tseng, Vincent S. editor.&#160;Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169&#160;Ho, Bao. editor.&#160;Ganji, Mohadeseh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93034-3">https://doi.org/10.1007/978-3-319-93034-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400575 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Stoyanov, Danail. editor.&#160;Taylor, Zeike. editor.&#160;Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220&#160;Syeda-Mahmood, Tanveer. editor.&#160;Martel, Anne. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:400249 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Phung, Dinh. editor.&#160;Tseng, Vincent S. editor.&#160;Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169&#160;Ho, Bao. editor.&#160;Ganji, Mohadeseh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93040-4">https://doi.org/10.1007/978-3-319-93040-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:402214 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Phung, Dinh. editor.&#160;Tseng, Vincent S. editor.&#160;Webb, Geoffrey I. editor. (orcid)0000-0001-9963-5169&#160;Ho, Bao. editor.&#160;Ganji, Mohadeseh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93037-4">https://doi.org/10.1007/978-3-319-93037-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:402493 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Amini, M. Hadi. editor.&#160;Boroojeni, Kianoosh G. editor.&#160;Iyengar, S.S. editor.&#160;Pardalos, Panos M. editor.&#160;Blaabjerg, Frede. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 ent://SD_ILS/0/SD_ILS:488884 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Krishnan, G. Sai Sundara. editor.&#160;Anitha, R. editor.&#160;Lekshmi, R. S. editor.&#160;Kumar, M. Senthil. editor.&#160;Bonato, Anthony. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Elementary information security ent://SD_ILS/0/SD_ILS:271272 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Smith, Richard E.<br/>Preferred Shelf Number&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:290667 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Baker, Paul, 1958-&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete book of data anonymization from planning to implementation ent://SD_ILS/0/SD_ILS:289065 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Raghunathan, Balaji.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:313473 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Stallings, William.&#160;Brown, Lawrie<br/>Preferred Shelf Number&#160;QA76.9 S73 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security strategies in Windows platforms and applications ent://SD_ILS/0/SD_ILS:271537 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Solomon, Michael.<br/>Preferred Shelf Number&#160;QA76.76.O63 S64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:318966 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Howard, Doug.&#160;Prince, Kevin.<br/>Preferred Shelf Number&#160;ONLINE(318966.1)<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a> ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a> MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Singhal, Anoop, 1958-<br/>Preferred Shelf Number&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:267737 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Skoudis, Ed.&#160;Zeltser, Lenny.<br/>Preferred Shelf Number&#160;QA76.9.A25 S58 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:108014 2024-11-19T11:33:51Z 2024-11-19T11:33:51Z Author&#160;Schneier, Bruce.<br/>Preferred Shelf Number&#160;QA76.9.A25 S35 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>