Search Results for Security Measures - Narrowed by: Electronic Library
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026ps$003d300?dt=list
2026-01-17T06:45:13Z
Measures and metrics in corporate security
ent://SD_ILS/0/SD_ILS:355952
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Campbell, George, 1942- author.<br/>Preferred Shelf Number ONLINE(355952.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006887">http://www.sciencedirect.com/science/book/9780128006887</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building a security measures and metrics program proven practices
ent://SD_ILS/0/SD_ILS:306643
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Campbell, George.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170070">http://www.sciencedirect.com/science/book/9780124170070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Pattern Recognition Proceedings of CIPR 2023
ent://SD_ILS/0/SD_ILS:527264
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Das, Asit Kumar. editor. Nayak, Janmenjoy. editor. Naik, Bighnaraj. editor. Vimal, S. editor. Pelusi, Danilo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3734-9">https://doi.org/10.1007/978-981-99-3734-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security IC4S 2022
ent://SD_ILS/0/SD_ILS:528006
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Tanwar, Sudeep. editor. Wierzchon, Slawomir T. editor. Singh, Pradeep Kumar. editor. Ganzha, Maria. editor. Epiphaniou, Gregory. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1479-1">https://doi.org/10.1007/978-981-99-1479-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next Generation Systems and Networks Proceedings of BITS EEE CON 2022
ent://SD_ILS/0/SD_ILS:528044
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bansal, Hari Om. editor. Ajmera, Pawan K. editor. Joshi, Sandeep. editor. Bansal, Ramesh C. editor. (orcid)0000-0002-1725-2648 Shekhar, Chandra. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0483-9">https://doi.org/10.1007/978-981-99-0483-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2022
ent://SD_ILS/0/SD_ILS:526883
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ranganathan, G. editor. Fernando, Xavier. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Computing and Applications Proceedings of ICDIC 2020
ent://SD_ILS/0/SD_ILS:528678
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Rao, B. Narendra Kumar. editor. Balasubramanian, R. editor. Wang, Shiuh-Jeng. editor. Nayak, Richi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Communication Technologies and Virtual Mobile Networks Proceedings of ICICV 2022
ent://SD_ILS/0/SD_ILS:528870
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Rajakumar, G. editor. Du, Ke-Lin. editor. Vuppalapati, Chandrasekar. editor. Beligiannis, Grigorios N. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-1844-5">https://doi.org/10.1007/978-981-19-1844-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the 6th International Conference on Advance Computing and Intelligent Engineering ICACIE 2021
ent://SD_ILS/0/SD_ILS:528875
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Pati, Bibudhendu. editor. Panigrahi, Chhabi Rani. editor. Mohapatra, Prasant. editor. Li, Kuan-Ching. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2225-1">https://doi.org/10.1007/978-981-19-2225-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems ICCCES 2022
ent://SD_ILS/0/SD_ILS:527539
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bindhu, V. editor. Tavares, João Manuel R. S. editor. Vuppalapati, Chandrasekar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7753-4">https://doi.org/10.1007/978-981-19-7753-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Computing and Sustainable Informatics Proceedings of ICMCSI 2023
ent://SD_ILS/0/SD_ILS:527730
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Shakya, Subarna. editor. Papakostas, George. editor. Kamel, Khaled A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-0835-6">https://doi.org/10.1007/978-981-99-0835-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information Communication Technology and Computing Proceedings of AICTC 2022
ent://SD_ILS/0/SD_ILS:527740
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Goar, Vishal. editor. Kuri, Manoj. editor. Kumar, Rajesh. editor. Senjyu, Tomonobu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9888-1">https://doi.org/10.1007/978-981-19-9888-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology NICE-DT 2023
ent://SD_ILS/0/SD_ILS:527944
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Singh, Sri Niwas. editor. Mahanta, Saurov. editor. Singh, Yumnam Jayanta. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-1699-3">https://doi.org/10.1007/978-981-99-1699-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolution in Computational Intelligence Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2022)
ent://SD_ILS/0/SD_ILS:529006
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bhateja, Vikrant. editor. Yang, Xin-She. editor. Lin, Jerry Chun-Wei. editor. Das, Ranjita. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7513-4">https://doi.org/10.1007/978-981-19-7513-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1
ent://SD_ILS/0/SD_ILS:529010
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Singh, Yashwant. editor. Singh, Pradeep Kumar. editor. Kolekar, Maheshkumar H. editor. Kar, Arpan Kumar. editor. Gonçalves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Soft Computing for Security Applications Proceedings of ICSCS 2023
ent://SD_ILS/0/SD_ILS:529021
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ranganathan, G. editor. EL Allioui, Youssouf. editor. Piramuthu, Selwyn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
ent://SD_ILS/0/SD_ILS:529055
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Schiffner, Stefan. editor. Ziegler, Sébastien. editor. (orcid)0000-0001-7255-4975 Jensen, Meiko. editor. (orcid)0009-0003-2397-9813 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Data and Social Networks 11th International Conference, CSoNet 2022, Virtual Event, December 5-7, 2022, Proceedings
ent://SD_ILS/0/SD_ILS:520813
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Dinh, Thang N. editor. Li, Minming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-26303-3">https://doi.org/10.1007/978-3-031-26303-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Technologies and Emerging Sciences ICCTES 2021
ent://SD_ILS/0/SD_ILS:526691
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Maurya, Sudhanshu. editor. Peddoju, Sateesh K. editor. Ahmad, Badlishah. editor. Chihi, Ines. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2538-2">https://doi.org/10.1007/978-981-19-2538-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Trust and Privacy Models, and Architectures in IoT Environments
ent://SD_ILS/0/SD_ILS:526748
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Fotia, Lidia. editor. Messina, Fabrizio. editor. Rosaci, Domenico. editor. Sarné, Giuseppe M.L. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21940-5">https://doi.org/10.1007/978-3-031-21940-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Cyber Security in Industry 4.0
ent://SD_ILS/0/SD_ILS:520462
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Sarveshwaran, Velliangiri. editor. Chen, Joy Iong-Zong. editor. Pelusi, Danilo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2115-7">https://doi.org/10.1007/978-981-99-2115-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Emerging Trends in Intelligent Systems & Network Security
ent://SD_ILS/0/SD_ILS:527281
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ben Ahmed, Mohamed. editor. Abdelhakim, Boudhir Anouar. editor. (orcid)0000-0003-4036-9956 Ane, Bernadetta Kwintiana. editor. Rosiyadi, Didi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-15191-0">https://doi.org/10.1007/978-3-031-15191-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity and Identity Access Management
ent://SD_ILS/0/SD_ILS:527374
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Rawal, Bharat S. author. Manogaran, Gunasekaran. author. Peter, Alexender. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023
ent://SD_ILS/0/SD_ILS:528415
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Giri, Debasis. editor. Gollmann, Dieter. editor. Ponnusamy, S. editor. Kouichi, Sakurai. editor. Stanimirović, Predrag S. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of Third International Conference on Computing, Communications, and Cyber-Security IC4S 2021
ent://SD_ILS/0/SD_ILS:528473
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Singh, Pradeep Kumar. editor. Wierzchoń, Sławomir T. editor. Tanwar, Sudeep. editor. Rodrigues, Joel J. P. C. editor. Ganzha, Maria. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-1142-2">https://doi.org/10.1007/978-981-19-1142-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Evolution in Computational Intelligence Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023)
ent://SD_ILS/0/SD_ILS:528820
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bhateja, Vikrant. editor. Yang, Xin-She. editor. Ferreira, Marta Campos. editor. (orcid)0000-0001-9505-5730 Sengar, Sandeep Singh. editor. Travieso-Gonzalez, Carlos M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-6702-5">https://doi.org/10.1007/978-981-99-6702-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Green Sustainability: Towards Innovative Digital Transformation Proceedings of ITAF 2023
ent://SD_ILS/0/SD_ILS:528766
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Magdi, Dalia. editor. El-Fetouh, Ahmed Abou. editor. Mamdouh, Mohamed. editor. Joshi, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-4764-5">https://doi.org/10.1007/978-981-99-4764-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI Embedded Assurance for Cyber Systems
ent://SD_ILS/0/SD_ILS:528935
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Wang, Cliff. editor. Iyengar, S.S. editor. Sun, Kun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-42637-7">https://doi.org/10.1007/978-3-031-42637-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust and records in an open digital environment
ent://SD_ILS/0/SD_ILS:549382
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Stančić, Hrvoje, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003005117">https://www.taylorfrancis.com/books/9781003005117</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Exploring security in software architecture and design
ent://SD_ILS/0/SD_ILS:481871
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484846
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bassioni, Ghada. editor. Kebe, Cheikh M.F. editor. Gueye, Assane. editor. (orcid)0000-0001-6469-4716 Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484847
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Askarov, Aslan. editor. Hansen, René Rydhof. editor. Rafnsson, Willard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic security solutions for the internet of things
ent://SD_ILS/0/SD_ILS:481771
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Banday, Mohammad Tariq, 1969- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime
ent://SD_ILS/0/SD_ILS:483013
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483366
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and security challenges in emerging networks
ent://SD_ILS/0/SD_ILS:481975
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity education for awareness and compliance
ent://SD_ILS/0/SD_ILS:482092
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Vasileiou, Ismini, 1980- editor. Furnell, Steven, 1970- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
National security : breakthroughs in research and practice
ent://SD_ILS/0/SD_ILS:482109
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities
ent://SD_ILS/0/SD_ILS:482113
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Gunasekhar, T., 1990- author. Rao, K. Thirupathi, author. Kiran, P. Sai, author. Krishna Reddy, V., author. Rao, B. Thirumala, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine learning and cognitive science applications in cyber security
ent://SD_ILS/0/SD_ILS:482151
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud security : concepts, methodologies, tools, and applications
ent://SD_ILS/0/SD_ILS:482163
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author IGI Global, publisher. Information Resources Management Association.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Countering cyber attacks and preserving the integrity and availability of critical systems
ent://SD_ILS/0/SD_ILS:482177
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483112
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Nandi, Sukumar. editor. Jinwala, Devesh. editor. Singh, Virendra. editor. Laxmi, Vijay. editor. Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483889
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Meng, Weizhi. editor. (orcid)0000-0003-4384-5786 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberdanger Understanding and Guarding Against Cybercrime
ent://SD_ILS/0/SD_ILS:485936
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tourism oriented policing and protective services
ent://SD_ILS/0/SD_ILS:482030
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Tarlow, Peter E., author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7579-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7579-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Wiley handbook on violence in education : forms, factors, and preventions
ent://SD_ILS/0/SD_ILS:424150
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Shapiro, Harvey, 1952- editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1002/9781118966709">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400306
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Budaghyan, Lilya. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400186
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Chowdhury, Kaushik Roy. editor. Di Felice, Marco. editor. Matta, Ibrahim. editor. Sheng, Bo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safe mobility : challenges, methodology and solutions
ent://SD_ILS/0/SD_ILS:422084
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Lord, Dominique, 1969- editor. Washington, Simon, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://www.emerald.com/insight/publication/doi/10.1108/S2044-9941201811">https://www.emerald.com/insight/publication/doi/10.1108/S2044-9941201811</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400107
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of cyber safety : computer and mobile device safety made easy
ent://SD_ILS/0/SD_ILS:459044
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Sammons, John, author. Cross, Michael, 1965- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RIoT control : understanding and managing risks and the internet of things
ent://SD_ILS/0/SD_ILS:459100
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Macaulay, Tyson, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199712">http://www.sciencedirect.com/science/book/9780124199712</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:459114
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Faircloth, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile security and privacy : advances, challenges and future research directions
ent://SD_ILS/0/SD_ILS:459122
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Au, Man-Ho, editor. Choo, Raymond Kim-Kwang, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128046296">https://www.sciencedirect.com/science/book/9780128046296</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking wireless access points : cracking, tracking, and signal jacking
ent://SD_ILS/0/SD_ILS:459299
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Kurtz, Jennifer Ann, author. Kaczmarek, Richard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128053157">http://www.sciencedirect.com/science/book/9780128053157</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the internet of things
ent://SD_ILS/0/SD_ILS:459335
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Federal cloud computing : the definitive guide for cloud service providers
ent://SD_ILS/0/SD_ILS:459338
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Metheny, Matthew, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128097106">http://www.sciencedirect.com/science/book/9780128097106</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safety of web applications : risks, encryption and handling vulnerabilities with PHP
ent://SD_ILS/0/SD_ILS:459467
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Quinton, Éric, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in network functions virtualization
ent://SD_ILS/0/SD_ILS:459901
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Zhang, Zonghua, author. Meddahi, Ahmed, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:459518
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guidelines for asset integrity management
ent://SD_ILS/0/SD_ILS:424271
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author American Institute of Chemical Engineers. Center for Chemical Process Safety, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1002/9781119364276">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile data loss : threats and countermeasures
ent://SD_ILS/0/SD_ILS:458729
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Automated security analysis of Android and iOS applications with mobile security framework
ent://SD_ILS/0/SD_ILS:458694
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Abraham, Ajin, author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128047187">https://www.sciencedirect.com/science/book/9780128047187</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data breach preparation and response : breaches are certain, impact is not
ent://SD_ILS/0/SD_ILS:458926
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Fowler, Kevvie, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security : defending the domain name system
ent://SD_ILS/0/SD_ILS:458935
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Liska, Allan, author. Stowe, Geoffrey, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber guerilla
ent://SD_ILS/0/SD_ILS:458953
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Young, Carl S., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh Hour CISSP®
ent://SD_ILS/0/SD_ILS:459073
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Conrad, Eric, author. Seth Misenar, author. Joshua Feldman, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security awareness for CEOs and management
ent://SD_ILS/0/SD_ILS:458665
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:458777
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network performance and security : testing and analyzing using open source and low-cost tools
ent://SD_ILS/0/SD_ILS:458789
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Chapman, Chris, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for penetration testers : building better tools
ent://SD_ILS/0/SD_ILS:459217
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Andress, Jason, author. Linn, Ryan, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data center handbook
ent://SD_ILS/0/SD_ILS:342066
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Geng, Hwaiyu, editor.<br/>Preferred Shelf Number ONLINE(342066.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10992793">An electronic book accessible through the World Wide Web; click to view</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118937563">http://dx.doi.org/10.1002/9781118937563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing online risk : apps, mobile, and social media security
ent://SD_ILS/0/SD_ILS:355514
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355514.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security analytics finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:355388
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Preferred Shelf Number ONLINE(355388.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing VoIP : keeping your VoIP network safe
ent://SD_ILS/0/SD_ILS:355417
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bates, Regis J. author.<br/>Preferred Shelf Number ONLINE(355417.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CSA guide to cloud computing implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:355449
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Samani, Raj, author. Honan, Brian, author. Reavis, Jim, author. Jirasek, Vladimir, editor. CSA (Organization), issuing body.<br/>Preferred Shelf Number ONLINE(355449.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Disaster planning for libraries : process and guidelines
ent://SD_ILS/0/SD_ILS:355356
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Robertson, Guy, author.<br/>Preferred Shelf Number ONLINE(355356.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781843347309">http://www.sciencedirect.com/science/book/9781843347309</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance : understand and implement effective PCI data security standard compliance
ent://SD_ILS/0/SD_ILS:355363
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Williams, Branden R., author. Chuvakin, Anton A., author. Milroy, Derek, editor<br/>Preferred Shelf Number ONLINE(355363.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Biometrics
ent://SD_ILS/0/SD_ILS:518417
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Li, Stan Z. editor. Jain, Anil K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4899-7488-4">https://doi.org/10.1007/978-1-4899-7488-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Methods for Cyber Warfare
ent://SD_ILS/0/SD_ILS:529457
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Yager, Ronald R. editor. Reformat, Marek Z. editor. Alajlan, Naif. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08624-8">https://doi.org/10.1007/978-3-319-08624-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Pattern Analysis, Intelligent Security and the Internet of Things
ent://SD_ILS/0/SD_ILS:530158
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Abraham, Ajith. editor. Muda, Azah Kamilah. editor. Choo, Yun-Huoy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-17398-6">https://doi.org/10.1007/978-3-319-17398-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Space Security Policies, Applications and Programs
ent://SD_ILS/0/SD_ILS:530452
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Schrogl, Kai-Uwe. editor. Hays, Peter L. editor. Robinson, Jana. editor. Moura, Denis. editor. Giannopapa, Christina. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-2029-3">https://doi.org/10.1007/978-1-4614-2029-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Complex System Modelling and Control Through Intelligent Soft Computations
ent://SD_ILS/0/SD_ILS:529159
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Zhu, Quanmin. editor. Azar, Ahmad Taher. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12883-2">https://doi.org/10.1007/978-3-319-12883-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risk Analysis and Management: Engineering Resilience
ent://SD_ILS/0/SD_ILS:529518
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Häring, Ivo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-0015-7">https://doi.org/10.1007/978-981-10-0015-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems Proceedings of ICAEES 2014, Volume 1
ent://SD_ILS/0/SD_ILS:529978
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Suresh, L. Padma. editor. Dash, Subhransu Sekhar. editor. Panigrahi, Bijaya Ketan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-81-322-2126-5">https://doi.org/10.1007/978-81-322-2126-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Wiley handbook of psychology, technology and society
ent://SD_ILS/0/SD_ILS:387129
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Cheever, Nancy A., editor. Rosen, Larry D., editor. Carrier, L. Mark, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1002/9781118771952">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dissecting the hack : the v3rb0ten network
ent://SD_ILS/0/SD_ILS:458624
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
ent://SD_ILS/0/SD_ILS:458699
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Richter, Andy, author. Wood, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Networked Systems Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:519167
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bouajjani, Ahmed. editor. Fauconnier, Hugues. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-26850-7">https://doi.org/10.1007/978-3-319-26850-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovating for Healthy Urbanization
ent://SD_ILS/0/SD_ILS:520014
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ahn, Roy. editor. Burke, Thomas F. editor. McGahan, Anita M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4899-7597-3">https://doi.org/10.1007/978-1-4899-7597-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart security : practices that increase business profits, proven practices
ent://SD_ILS/0/SD_ILS:355715
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Quilter, J. David, author.<br/>Preferred Shelf Number ONLINE(355715.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009277">http://www.sciencedirect.com/science/book/9780128009277</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009222">http://www.sciencedirect.com/science/book/9780128009222</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The handbook for school safety and security : best practices and procedures
ent://SD_ILS/0/SD_ILS:355580
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Fennelly, Lawrence J., 1940- editor. Perry, Marianna A., editor.<br/>Preferred Shelf Number ONLINE(355580.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005682">http://www.sciencedirect.com/science/book/9780128005682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for business professionals how to plan, implement, and manage your company's security program
ent://SD_ILS/0/SD_ILS:355603
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Wayland, Bradley A., author.<br/>Preferred Shelf Number ONLINE(355603.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005651">http://www.sciencedirect.com/science/book/9780128005651</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building an information security awareness program defending against social engineering and technical threats
ent://SD_ILS/0/SD_ILS:355618
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Gardner, Bill (Bill G.) Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number ONLINE(355618.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Workplace security essentials a guide for helping organizations create safe work environments
ent://SD_ILS/0/SD_ILS:355897
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Smith, Eric N. (Eric Newell), 1967-<br/>Preferred Shelf Number ONLINE(355897.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124165571">http://www.sciencedirect.com/science/book/9780124165571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security careers skills, compensation, and career paths
ent://SD_ILS/0/SD_ILS:356043
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Bank fraud : using technology to combat losses
ent://SD_ILS/0/SD_ILS:341942
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Subramanian, Revathi, author.<br/>Preferred Shelf Number ONLINE(341942.1)<br/>Electronic Access Bloomberg Law <a href="https://www.bloomberglaw.com/browser/105.491080">https://www.bloomberglaw.com/browser/105.491080</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=63460">http://www.books24x7.com/marc.asp?bookid=63460</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz405667086cov.htm">http://swbplus.bsz-bw.de/bsz405667086cov.htm</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=836562">http://public.eblib.com/choice/publicfullrecord.aspx?p=836562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chinese cybersecurity and cyberdefense
ent://SD_ILS/0/SD_ILS:342155
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ventre, Daniel.<br/>Preferred Shelf Number ONLINE(342155.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a>
MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security
ent://SD_ILS/0/SD_ILS:342168
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Unmaking the bomb a fissile material approach to nuclear disarmament and nonproliferation
ent://SD_ILS/0/SD_ILS:323735
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Feiveson, Harold A. Von Hippel, Frank. Mian, Zia. Glaser, Alexander, 1969- Project Muse.<br/>Preferred Shelf Number ONLINE(323735.1)<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780262319188/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resource optimization and security for cloud services
ent://SD_ILS/0/SD_ILS:341979
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Xiong, Kaiqi, author.<br/>Preferred Shelf Number ONLINE(341979.1)<br/>Electronic Access MyiLibrary <a href="http://www.myilibrary.com?id=578586">http://www.myilibrary.com?id=578586</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118898598">http://dx.doi.org/10.1002/9781118898598</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime and cyberwarfare
ent://SD_ILS/0/SD_ILS:341980
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity for executives : a practical guide
ent://SD_ILS/0/SD_ILS:341997
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber reconnaissance, surveillance, and defense
ent://SD_ILS/0/SD_ILS:355450
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online security for the business traveler
ent://SD_ILS/0/SD_ILS:355575
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355575.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The deadly life of logistics mapping the violence of global trade
ent://SD_ILS/0/SD_ILS:323619
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Cowen, Deborah. Project Muse.<br/>Preferred Shelf Number ONLINE(323619.1)<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781452943183/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:306690
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing information security
ent://SD_ILS/0/SD_ILS:306692
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Total information risk management maximizing the value of data and information assets
ent://SD_ILS/0/SD_ILS:306693
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Borek, Alexander.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Business continuity and disaster recovery planning for IT professionals
ent://SD_ILS/0/SD_ILS:306695
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems
ent://SD_ILS/0/SD_ILS:355352
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Knapp, Eric D. Langill, Joel Thomas.<br/>Preferred Shelf Number ONLINE(355352.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
ent://SD_ILS/0/SD_ILS:355853
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of digital privacy simple tools to protect your personal information and your identity online
ent://SD_ILS/0/SD_ILS:356123
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Cherry, Denny. LaRock, Thomas.<br/>Preferred Shelf Number ONLINE(356123.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safeguarding cultural properties : security for museums, libraries, parks, and zoos
ent://SD_ILS/0/SD_ILS:355864
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Layne, Stevan P., author.<br/>Preferred Shelf Number ONLINE(355864.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201125">http://www.sciencedirect.com/science/book/9780124201125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Personnel protection : residential security, proven practices
ent://SD_ILS/0/SD_ILS:355716
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Miller, Jerome, author. Jones, Radford, author.<br/>Preferred Shelf Number ONLINE(355716.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009284">http://www.sciencedirect.com/science/book/9780128009284</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tourism security strategies for effectively managing travel risk and safety
ent://SD_ILS/0/SD_ILS:355736
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Tarlow, Peter E.<br/>Preferred Shelf Number ONLINE(355736.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124115705">http://www.sciencedirect.com/science/book/9780124115705</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:355770
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The manager's handbook for business security
ent://SD_ILS/0/SD_ILS:355908
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Campbell, George, 1942-<br/>Preferred Shelf Number ONLINE(355908.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000625">http://www.sciencedirect.com/science/book/9780128000625</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:355909
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Maritime security in Southeast Asia
ent://SD_ILS/0/SD_ILS:239577
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bradford, John F. National Bureau of Asian Research (U.S.) Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in cyber security technology, operations, and experiences
ent://SD_ILS/0/SD_ILS:239591
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
New directions of modern cryptography
ent://SD_ILS/0/SD_ILS:344263
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless reconnaissance in penetration testing
ent://SD_ILS/0/SD_ILS:306460
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The benefits and security risks of web-based applications for business trend report
ent://SD_ILS/0/SD_ILS:306640
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Kotwica, Kathleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Aligning security services with business objectives proven practices
ent://SD_ILS/0/SD_ILS:306642
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Lefler, Richard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170087">http://www.sciencedirect.com/science/book/9780124170087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Corporate security organizational structure, cost of services and staffing benchmark research report / Bob Hayes, Greg Kane, Kathleen Kotwica.
ent://SD_ILS/0/SD_ILS:306647
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hayes, Bob E., 1963- Kane, Greg. Kotwica, Kathleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170025">http://www.sciencedirect.com/science/book/9780124170025</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information protection playbook
ent://SD_ILS/0/SD_ILS:306649
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and IT infrastructure protection
ent://SD_ILS/0/SD_ILS:306691
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of web hacking tools and techniques to attack the Web
ent://SD_ILS/0/SD_ILS:306699
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes
ent://SD_ILS/0/SD_ILS:313044
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Fadyushin, Vyacheslav.<br/>Preferred Shelf Number ONLINE(313044.1)<br/>Electronic Access Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied network security monitoring collection, detection, and analysis
ent://SD_ILS/0/SD_ILS:356122
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Sanders, Chris. Smith, Jason.<br/>Preferred Shelf Number ONLINE(356122.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless reconnaissance in penetration testing
ent://SD_ILS/0/SD_ILS:145690
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
FISMA and the risk management framework the new practice of federal cyber security
ent://SD_ILS/0/SD_ILS:145936
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Gantz, Stephen D. Philpott, Daniel R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:146917
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
UTM security with Fortinet Mastering FortiOS
ent://SD_ILS/0/SD_ILS:146934
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Tam, Kenneth.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:241837
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Justice and security in the 21st century risks, rights and the rule of law
ent://SD_ILS/0/SD_ILS:259735
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ugelvik, Synnøve, 1978- Hudson, Barbara, 1945-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203125588">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Maritime piracy
ent://SD_ILS/0/SD_ILS:260902
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Haywood, Robert. Spivak, Roberta.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203144817">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Maritime private security market responses to piracy, terrorism and waterborne security risks in the 21st century
ent://SD_ILS/0/SD_ILS:260719
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Berube, Claude G., 1966- Cullen, Patrick, 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203126608">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wiki at war conflict in a socially networked world
ent://SD_ILS/0/SD_ILS:276700
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing
ent://SD_ILS/0/SD_ILS:279514
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Weber, Stefan G. IOS Press.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Robust control system networks how to achieve reliable control after Stuxnet
ent://SD_ILS/0/SD_ILS:280181
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Langner, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless network security a beginner's guide
ent://SD_ILS/0/SD_ILS:293230
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Wrightson, Tyler.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/wireless-network-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security metrics a beginner's guide
ent://SD_ILS/0/SD_ILS:293238
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the clicks network security in the age of social media
ent://SD_ILS/0/SD_ILS:293240
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle WebLogic server 11g administration handbook
ent://SD_ILS/0/SD_ILS:293243
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Alapati, Sam R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Operating systems demystified
ent://SD_ILS/0/SD_ILS:294101
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ending campus violence new approaches to prevention
ent://SD_ILS/0/SD_ILS:259955
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Van Brunt, Brian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203149560">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Competition and efficiency in international food supply chains improving food security
ent://SD_ILS/0/SD_ILS:260810
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Williams, John, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203122365">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The early years health and safety handbook
ent://SD_ILS/0/SD_ILS:262276
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Parker, Lynn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203809662">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RFID in libraries a step toward interoperability
ent://SD_ILS/0/SD_ILS:281069
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ayre, Lori Bowen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
iPhone geekery 50 insanely cool hacks and mods for your iPhone 4S
ent://SD_ILS/0/SD_ILS:293446
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/iphone-geekery-50-insanely-cool-hacks-mods-for-your-4s">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The healthy PC preventive care, home remedies, and green computing
ent://SD_ILS/0/SD_ILS:293464
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Photonic sensing principles and applications for safety and security monitoring
ent://SD_ILS/0/SD_ILS:299365
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Xiao, George. Bock, Wojtek J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118310205">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118310212">http://dx.doi.org/10.1002/9781118310212</a>
ebrary <a href="http://site.ebrary.com/id/10602117">http://site.ebrary.com/id/10602117</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118310205">http://proquest.tech.safaribooksonline.de/9781118310205</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security aspects of uni-and multimodal hazmat transportation systems
ent://SD_ILS/0/SD_ILS:306265
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Reniers, Genserik L. L. Zamparini, Luca.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9783527664818">http://onlinelibrary.wiley.com/book/10.1002/9783527664818</a>
Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527664818">http://dx.doi.org/10.1002/9783527664818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ports in a storm : public management in a turbulent world
ent://SD_ILS/0/SD_ILS:376401
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Donahue, John D. Moore, Mark H., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.7864/j.ctt12636r">http://www.jstor.org/stable/10.7864/j.ctt12636r</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Against security : how we go wrong at airports, subways, and other sites of ambiguous danger
ent://SD_ILS/0/SD_ILS:376713
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Molotch, Harvey Luskin, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.cttq94nr">http://www.jstor.org/stable/10.2307/j.cttq94nr</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How Ottawa spends, 2012-2013 : the Harper majority, budget cuts, and the new opposition
ent://SD_ILS/0/SD_ILS:376963
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Doern, G. Bruce. Stoney, Christopher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt1pq1f8">http://www.jstor.org/stable/10.2307/j.ctt1pq1f8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
ent://SD_ILS/0/SD_ILS:145254
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The hacker's guide to OS X exploiting OS X from the root up
ent://SD_ILS/0/SD_ILS:148006
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance
ent://SD_ILS/0/SD_ILS:148429
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Chuvakin, Anton. Williams, Branden R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CISSP study guide
ent://SD_ILS/0/SD_ILS:148769
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risk analysis and the security survey
ent://SD_ILS/0/SD_ILS:149062
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Broder, James F. Tucker, Eugene.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123822338">http://www.sciencedirect.com/science/book/9780123822338</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows forensic analysis toolkit advanced analysis techniques for Windows 7
ent://SD_ILS/0/SD_ILS:145689
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent threat understanding the danger and how to protect your organization
ent://SD_ILS/0/SD_ILS:146056
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
ent://SD_ILS/0/SD_ILS:146274
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking web apps detecting and preventing web application security problems
ent://SD_ILS/0/SD_ILS:148161
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of loss prevention and crime prevention
ent://SD_ILS/0/SD_ILS:148175
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123852465">http://www.sciencedirect.com/science/book/9780123852465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:148516
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Client-side attacks and defense
ent://SD_ILS/0/SD_ILS:148731
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Oriyano, Sean-Philip. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook on securing cyber-physical critical infrastructure
ent://SD_ILS/0/SD_ILS:145579
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Nuclear energy and global governance ensuring safety, security, and non-proliferation
ent://SD_ILS/0/SD_ILS:262536
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Findlay, Trevor, 1951-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203834503">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The securitization of migration a study of movement and order
ent://SD_ILS/0/SD_ILS:265336
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Bourbeau, Philippe, 1972 Nov. 3-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203829349">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Terrorism and the Olympics major event security and lessons for the future
ent://SD_ILS/0/SD_ILS:265369
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Richards, Anthony. Fussey, Peter. Silke, Andrew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203835227">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to security considerations and practices for rare book, manuscript, and special collection libraries
ent://SD_ILS/0/SD_ILS:280094
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Wilkie, Everett C. Association of College and Research Libraries.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Management strategies for the cloud revolution how cloud computing is transforming business and why you can't afford to be left behind
ent://SD_ILS/0/SD_ILS:292969
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Babcock, Charles.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/management-strategies-for-cloud-revolution-how-computing-transforming-business-you-cant-afford-to-be-left-behind">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Tips and traps for new home owners
ent://SD_ILS/0/SD_ILS:293022
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Irwin, Robert, 1941-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/tips-traps-for-new-home-owners">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle Fusion middleware 11g architecture and management
ent://SD_ILS/0/SD_ILS:293252
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft SQL server 2008 R2 master data services implementation & administration
ent://SD_ILS/0/SD_ILS:293261
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Graham, Tyler. Selhorn, Suzanne.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-r2-master-data-services">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Master data management and data governance
ent://SD_ILS/0/SD_ILS:293267
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Berson, Alex. Dubov, Lawrence. Berson, Alex. Master data management and customer data integration for a global enterprise.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/master-data-management-governance-2e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
iPad & iPhone administrator's guide enterprise deployment strategies and security solutions
ent://SD_ILS/0/SD_ILS:293268
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/ipad-iphone-administrators-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing an IAM framework with Oracle identity and access management suite
ent://SD_ILS/0/SD_ILS:293289
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT security metrics a practical framework for measuring security & protecting data
ent://SD_ILS/0/SD_ILS:293294
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac OS X system administration
ent://SD_ILS/0/SD_ILS:293298
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless network administration a beginner's guide
ent://SD_ILS/0/SD_ILS:293305
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Soyinka, Wale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/wireless-network-administration-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile application security
ent://SD_ILS/0/SD_ILS:293312
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Networking a beginner's guide
ent://SD_ILS/0/SD_ILS:293314
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle WebCenter 11g handbook build rich, customizable enterprise 2.0 applications
ent://SD_ILS/0/SD_ILS:293316
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Desbiens, Fr�ed�eric. Moskovits, Peter. Weckerle, Philipp.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-webcenter-11g-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco ASA configuration
ent://SD_ILS/0/SD_ILS:293322
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Deal, Richard A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Maritime security and the law of the sea
ent://SD_ILS/0/SD_ILS:231006
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Klein, Natalie (Natalie S.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wars of disruption and resilience cybered conflict, power, and national security
ent://SD_ILS/0/SD_ILS:244312
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Our biometric future facial recognition technology and the culture of surveillance
ent://SD_ILS/0/SD_ILS:243822
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Gates, Kelly. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780814732793/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to physical security planning & response for hospitals, medical, long term care facilities
ent://SD_ILS/0/SD_ILS:278636
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Russell, Mary, 1953- Kendig, Jim. Philpott, Don, 1946-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guidelines for the physical security of water utilities, ANSI/ASCE/EWRI 56-10 Guidelines for the physical security of wastewater/stormwater utilities, ANSI/ASCE/EWRI 57-10
ent://SD_ILS/0/SD_ILS:279319
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author American Society of Civil Engineers. Environmental and Water Resources Institute (U.S.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blast protection of buildings
ent://SD_ILS/0/SD_ILS:279920
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author American Society of Civil Engineers.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=466935">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=466935</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Construction site security
ent://SD_ILS/0/SD_ILS:293203
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Arata, Michael J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/construction-site-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Property condition assessments
ent://SD_ILS/0/SD_ILS:293206
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Kubba, Shamil A. A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/property-condition-assessments">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Perimeter security
ent://SD_ILS/0/SD_ILS:293213
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Arata, Michael J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/perimeter-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next catastrophe : reducing our vulnerabilities to natural, industrial, and terrorist disasters
ent://SD_ILS/0/SD_ILS:375287
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Perrow, Charles.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7t4c1">http://www.jstor.org/stable/10.2307/j.ctt7t4c1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and U.S. Foreign Policy : Iraq, 9/11, and Misguided Reform.
ent://SD_ILS/0/SD_ILS:375742
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.7312/pill15792">http://www.jstor.org/stable/10.7312/pill15792</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing global transportation networks a total security management approach
ent://SD_ILS/0/SD_ILS:293169
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ritter, Luke. Barrett, J. Michael. Wilson, Rosalyn A. Ridge, Thomas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-global-transportation-networks">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Architectural security codes and guidelines best practices for today's construction challenges
ent://SD_ILS/0/SD_ILS:293173
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Wible, Robert C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/architectural-security-codes-guidelines">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risk and Safety Analysis of Nuclear Systems
ent://SD_ILS/0/SD_ILS:298891
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Lee, John C., 1941- author. McCormick, Norman J., 1938- author. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118043462">An electronic book accessible through the World Wide Web; click for information</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=325614&ref=toc">http://www.myilibrary.com?id=325614&ref=toc</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43276">http://www.books24x7.com/marc.asp?bookid=43276</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10494682">http://site.ebrary.com/lib/alltitles/Doc?id=10494682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fedora 7 & Red Hat Enterprise Linux the complete reference
ent://SD_ILS/0/SD_ILS:293328
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Petersen, Richard, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ajax the complete reference
ent://SD_ILS/0/SD_ILS:293344
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Powell, Thomas A., 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/ajax-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle Enterprise manager 10g grid control implementation guide
ent://SD_ILS/0/SD_ILS:293355
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author New, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-enterprise-manager-10g-grid-control-implementation-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows server 2008 the complete reference
ent://SD_ILS/0/SD_ILS:293367
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ruest, Danielle. Ruest, Nelson.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows server 2008 a beginner's guide
ent://SD_ILS/0/SD_ILS:293368
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Citrix Access Suite 4 advanced concepts the official guide
ent://SD_ILS/0/SD_ILS:293372
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Kaplan, Steve, 1955- Jones, Andy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CNET do-it-yourself home networking projects 24 cool things you didn't know you could do!
ent://SD_ILS/0/SD_ILS:293687
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Aspinwall, Jim. CNET (Firm)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Home networking demystified a self-teaching guide
ent://SD_ILS/0/SD_ILS:294143
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Long, Larry E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Working positively with personality disorder in secure settings a practitioner's perspective
ent://SD_ILS/0/SD_ILS:298579
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Willmot, Phil. Gordon, Neil, 1959- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9780470973110">An electronic book accessible through the World Wide Web; click for information</a>
Wiley InterScience - Full Text Online <a href="http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110">http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Essentials of online payment security and fraud prevention
ent://SD_ILS/0/SD_ILS:304086
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Montague, David A., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118386750">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624574">http://swb.eblib.com/patron/FullRecord.aspx?p=624574</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:303838
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proactive school security and emergency preparedness planning
ent://SD_ILS/0/SD_ILS:369105
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Trump, Kenneth S.<br/>Preferred Shelf Number ONLINE(369105.1)<br/>Electronic Access SAGE knowledge <a href="http://sk.sagepub.com/books/proactive-school-security-and-emergency-preparedness-planning">http://sk.sagepub.com/books/proactive-school-security-and-emergency-preparedness-planning</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Energy and security in South Asia : cooperation or conflict?
ent://SD_ILS/0/SD_ILS:375731
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ebinger, Charles K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.7864/j.ctt127x8w">http://www.jstor.org/stable/10.7864/j.ctt127x8w</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Android forensics investigation, analysis, and mobile security for Google Android
ent://SD_ILS/0/SD_ILS:145253
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Hoog, Andrew. McCash, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:148225
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Faircloth, Jeremy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for penetration testers building better tools
ent://SD_ILS/0/SD_ILS:148785
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Andress, Jason. Linn, Ryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security risk management building an information security risk management program from the ground up
ent://SD_ILS/0/SD_ILS:149172
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Wheeler, Evan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the smart grid next generation power grid security
ent://SD_ILS/0/SD_ILS:149144
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Flick, Tony. Morehouse, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495707">http://www.sciencedirect.com/science/book/9781597495707</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems
ent://SD_ILS/0/SD_ILS:145457
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Knapp, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour CISSP study guide
ent://SD_ILS/0/SD_ILS:146597
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Thor's Microsoft security bible a collection of practical security techniques
ent://SD_ILS/0/SD_ILS:146808
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Mullen, Timothy M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the cloud cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:148980
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber warfare techniques, tactics and tools for security practitioners
ent://SD_ILS/0/SD_ILS:147479
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Andress, Jason. Winterfeld, Steve. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ninja hacking unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:146263
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Wilhelm, Thomas. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Effective security management
ent://SD_ILS/0/SD_ILS:146471
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Sennewald, Charles A., 1931-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123820129">http://www.sciencedirect.com/science/book/9780123820129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security A Decision and Game-Theoretic Approach
ent://SD_ILS/0/SD_ILS:237887
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Alpcan, Tansu. Başar, Tamer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Food Crises and the WTO World Trade Forum
ent://SD_ILS/0/SD_ILS:238910
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Karapinar, Baris. Häberli, Christian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511712005">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
One nation under siege Congress, terrorism, and the fate of American democracy
ent://SD_ILS/0/SD_ILS:246111
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Jones Evans, Jocelyn. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780813173825/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
China's cyberwarfare capability
ent://SD_ILS/0/SD_ILS:281481
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Marvel, Elisabette M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cognitive Radio Networking and Security A Game-Theoretic View
ent://SD_ILS/0/SD_ILS:238948
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Liu, K. J. Ray. Wang, Beibei.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Schools under surveillance cultures of control in public education
ent://SD_ILS/0/SD_ILS:245796
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Torres, Rodolfo D., 1949- Monahan, Torin. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780813548265/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Chaos synchronization and cryptography for secure communications applications for encryption
ent://SD_ILS/0/SD_ILS:277940
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Banerjee, Santo, 1976- IGI Global.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Working positively with personality disorder in secure settings a practitioner's perspective
ent://SD_ILS/0/SD_ILS:318962
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Willmot, Phil. Gordon, Neil, 1959-<br/>Preferred Shelf Number ONLINE(318962.1)<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9780470973110">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=624713">http://public.eblib.com/choice/publicfullrecord.aspx?p=624713</a>
ebrary <a href="http://site.ebrary.com/id/10441456">http://site.ebrary.com/id/10441456</a>
EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=345825">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=345825</a>
Wiley InterScience - Full Text Online <a href="http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110">http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WiMAX security and quality of service an end-to-end perspective
ent://SD_ILS/0/SD_ILS:298107
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Tang, Seok-Yee, 1968- Müller, Peter, 1961 July 8- Sharif, Hamid R. (Hamid Reza), 1958- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=543017">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=543017</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470665749">http://dx.doi.org/10.1002/9780470665749</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=36479">http://www.books24x7.com/marc.asp?bookid=36479</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
This is not a firedrill crisis intervention and prevention on college campuses
ent://SD_ILS/0/SD_ILS:304055
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Myer, Rick. James, Richard K., 1942- Moulton, Patrice. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269909">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706613">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:306328
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:306330
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance.
ent://SD_ILS/0/SD_ILS:148342
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Chuvakin, Anton. Williams, Branden R. Spangenberg, Ward.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Haines, Brad.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest network attacks
ent://SD_ILS/0/SD_ILS:149185
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Prowell, Stacy J. Kraus, Rob. Borkin, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hospital and healthcare security
ent://SD_ILS/0/SD_ILS:145608
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Colling, Russell L. York, Tony W. Colling, Russell L. Hospital security.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856176132">http://www.sciencedirect.com/science/book/9781856176132</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:146715
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A guide to kernel exploitation attacking the core
ent://SD_ILS/0/SD_ILS:148059
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Perla, Enrico. Massimiliano, Oldani.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:148953
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest Unified Communications attacks
ent://SD_ILS/0/SD_ILS:148967
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author York, Dan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495479">http://www.sciencedirect.com/science/book/9781597495479</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:149103
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managed code rootkits hooking into runtime environments
ent://SD_ILS/0/SD_ILS:147836
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Metula, Erez.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour network+ exam N10-004 study guide
ent://SD_ILS/0/SD_ILS:146455
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Alpern, Naomi J. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
International aviation and terrorism evolving threat, evolving security
ent://SD_ILS/0/SD_ILS:266868
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Harrison, John, 1970-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203878712">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security risk management body of knowledge
ent://SD_ILS/0/SD_ILS:297759
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Talbot, Julian. Jakeman, Miles Gareth. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470494974">http://dx.doi.org/10.1002/9780470494974</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43285">http://www.books24x7.com/marc.asp?bookid=43285</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=230340&ref=toc">http://www.myilibrary.com?id=230340&ref=toc</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SIP security
ent://SD_ILS/0/SD_ILS:297791
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless and mobile network security security basics, security in On-the-shelf and emergeing technologies
ent://SD_ILS/0/SD_ILS:297992
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Chaouchi, Hakima. Laurent-Maknavicius, Maryline. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470611883">http://dx.doi.org/10.1002/9780470611883</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10361067">http://site.ebrary.com/lib/alltitles/Doc?id=10361067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile communication systems and security
ent://SD_ILS/0/SD_ILS:249807
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Rhee, Man Young.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security governance a practical development and implementation approach
ent://SD_ILS/0/SD_ILS:297743
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information warfare
ent://SD_ILS/0/SD_ILS:304069
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Ventre, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safe and secure schools 27 strategies for prevention and intervention
ent://SD_ILS/0/SD_ILS:369274
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Brunner, Judy M. Lewis, Dennis K.<br/>Preferred Shelf Number ONLINE(369274.1)<br/>Electronic Access SAGE knowledge <a href="http://sk.sagepub.com/books/safe-and-secure-schools">http://sk.sagepub.com/books/safe-and-secure-schools</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:144722
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco router and switch forensics investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:148703
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next generation SSH2 implementation securing data in motion
ent://SD_ILS/0/SD_ILS:146275
2026-01-17T06:45:13Z
2026-01-17T06:45:13Z
Author Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>