Search Results for Security Measures.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026ps$003d300?dt=list2024-11-23T13:01:13ZMeasures and metrics in corporate securityent://SD_ILS/0/SD_ILS:3559522024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Campbell, George, 1942- author.<br/>Preferred Shelf Number ONLINE(355952.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006887">http://www.sciencedirect.com/science/book/9780128006887</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building a security measures and metrics program proven practicesent://SD_ILS/0/SD_ILS:3066432024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Campbell, George.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170070">http://www.sciencedirect.com/science/book/9780124170070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Data and Social Networks 11th International Conference, CSoNet 2022, Virtual Event, December 5-7, 2022, Proceedingsent://SD_ILS/0/SD_ILS:5208132024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Dinh, Thang N. editor. Li, Minming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520813.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-26303-3">https://doi.org/10.1007/978-3-031-26303-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial Intelligence and Cyber Security in Industry 4.0ent://SD_ILS/0/SD_ILS:5204622024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sarveshwaran, Velliangiri. editor. Chen, Joy Iong-Zong. editor. Pelusi, Danilo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520462.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2115-7">https://doi.org/10.1007/978-981-99-2115-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dijital güvenlik : dijital ortamlarda güvenle var olmakent://SD_ILS/0/SD_ILS:5171792024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Preferred Shelf Number QA76.9.E74 O94 2022<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Elektronik harpent://SD_ILS/0/SD_ILS:5143482024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Pakfiliz, Ahmet Güngör.<br/>Preferred Shelf Number UG485 P35 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Ağ yönetimi ve bilgi güvenliğient://SD_ILS/0/SD_ILS:5162752024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bilge, Alper. Kaçmaz, Emre.<br/>Preferred Shelf Number TK5105.59 A98 2021<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Uygulamalarla siber güvenliğe girişent://SD_ILS/0/SD_ILS:5101512024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Akyıldız, M. Alparslan.<br/>Preferred Shelf Number TK5105.59.A39 U94 2020<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Türkiye’de ve dünyada siber güvenlikent://SD_ILS/0/SD_ILS:5149582024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Çeliktaş, Barış .<br/>Preferred Shelf Number UG485 C45 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Web sızma testleri el kitabıent://SD_ILS/0/SD_ILS:4795212024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Akyıldız, M. Alparslan. Saner, Doğukan.<br/>Preferred Shelf Number QA76.9 A39 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Yeni medyada gözetim ve mahremiyetin dönüşümü : gözetimin yeniden üretildiği bir alan olarak yeni medya ve mahremiyet algısındaki değişiment://SD_ILS/0/SD_ILS:5117802024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Rizanaj, Flora Hajdarmataj.<br/>Preferred Shelf Number HM742 R59 2020<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cloud security : concepts, methodologies, tools, and applicationsent://SD_ILS/0/SD_ILS:4821632024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor IGI Global, publisher. Information Resources Management Association.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering cyber attacks and preserving the integrity and availability of critical systemsent://SD_ILS/0/SD_ILS:4821772024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security and its impact on business strategyent://SD_ILS/0/SD_ILS:4822132024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced methodologies and technologies in system security, information privacy, and forensicsent://SD_ILS/0/SD_ILS:4820092024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crimeent://SD_ILS/0/SD_ILS:4830132024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4831122024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Nandi, Sukumar. editor. Jinwala, Devesh. editor. Singh, Virendra. editor. Laxmi, Vijay. editor. Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4838892024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Meng, Weizhi. editor. (orcid)0000-0003-4384-5786 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4840472024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4841862024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptographic security solutions for the internet of thingsent://SD_ILS/0/SD_ILS:4817712024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Banday, Mohammad Tariq, 1969- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Exploring security in software architecture and designent://SD_ILS/0/SD_ILS:4818712024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning and cognitive science applications in cyber securityent://SD_ILS/0/SD_ILS:4821512024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity education for awareness and complianceent://SD_ILS/0/SD_ILS:4820922024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Vasileiou, Ismini, 1980- editor. Furnell, Steven, 1970- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4821132024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Gunasekhar, T., 1990- author. Rao, K. Thirupathi, author. Kiran, P. Sai, author. Krishna Reddy, V., author. Rao, B. Thirumala, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4849082024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial intelligence and security challenges in emerging networksent://SD_ILS/0/SD_ILS:4819752024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4833662024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4845182024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4848462024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bassioni, Ghada. editor. Kebe, Cheikh M.F. editor. Gueye, Assane. editor. (orcid)0000-0001-6469-4716 Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4848472024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Askarov, Aslan. editor. Hansen, René Rydhof. editor. Rafnsson, Willard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberdanger Understanding and Guarding Against Cybercrimeent://SD_ILS/0/SD_ILS:4859362024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4869442024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Usta, Gökhan.<br/>Preferred Shelf Number QA76.9.A25 U88 2019<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Siber güvenlik ve savunma : standartlar ve uygulamalarent://SD_ILS/0/SD_ILS:4622832024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sağıroğlu, Şeref.<br/>Preferred Shelf Number TK5105.59 S53 2019<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001862024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Chowdhury, Kaushik Roy. editor. Di Felice, Marco. editor. Matta, Ibrahim. editor. Sheng, Bo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4003062024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Budaghyan, Lilya. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safe mobility : challenges, methodology and solutionsent://SD_ILS/0/SD_ILS:4220842024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Lord, Dominique, 1969- editor. Washington, Simon, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://www.emerald.com/insight/publication/doi/10.1108/S2044-9941201811">https://www.emerald.com/insight/publication/doi/10.1108/S2044-9941201811</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dijital mahremiyet : Yeni medya ve gözetim toplumuent://SD_ILS/0/SD_ILS:4626212024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Arık, Emel.<br/>Preferred Shelf Number HM742 A75 2018<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Tourism oriented policing and protective servicesent://SD_ILS/0/SD_ILS:4820302024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Tarlow, Peter E., author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7579-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7579-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001072024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Exploit geliştirme 101ent://SD_ILS/0/SD_ILS:3890772024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Akyıldız, M. Alparslan.<br/>Preferred Shelf Number QA76.9.A25 A59 2018<br/>Format: Books<br/>Availability Beytepe Library~2<br/>The Wiley handbook on violence in education : forms, factors, and preventionsent://SD_ILS/0/SD_ILS:4241502024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Shapiro, Harvey, 1952- editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1002/9781118966709">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:4590442024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sammons, John, author. Cross, Michael, 1965- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:4591002024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Macaulay, Tyson, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199712">http://www.sciencedirect.com/science/book/9780124199712</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:4591142024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Faircloth, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:4591222024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Au, Man-Ho, editor. Choo, Raymond Kim-Kwang, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128046296">https://www.sciencedirect.com/science/book/9780128046296</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:4591452024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building a practical information security programent://SD_ILS/0/SD_ILS:4591462024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking wireless access points : cracking, tracking, and signal jackingent://SD_ILS/0/SD_ILS:4592992024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Kurtz, Jennifer Ann, author. Kaczmarek, Richard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128053157">http://www.sciencedirect.com/science/book/9780128053157</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:4592042024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:4593352024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Federal cloud computing : the definitive guide for cloud service providersent://SD_ILS/0/SD_ILS:4593382024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Metheny, Matthew, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128097106">http://www.sciencedirect.com/science/book/9780128097106</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:4595182024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Vacca, John R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safety of web applications : risks, encryption and handling vulnerabilities with PHPent://SD_ILS/0/SD_ILS:4594672024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Quinton, Éric, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in network functions virtualizationent://SD_ILS/0/SD_ILS:4599012024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Zhang, Zonghua, author. Meddahi, Ahmed, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:4586652024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Automated security analysis of Android and iOS applications with mobile security frameworkent://SD_ILS/0/SD_ILS:4586942024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Abraham, Ajin, author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128047187">https://www.sciencedirect.com/science/book/9780128047187</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Eleventh Hour CISSP®ent://SD_ILS/0/SD_ILS:4590732024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Conrad, Eric, author. Seth Misenar, author. Joshua Feldman, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:4587772024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:4587892024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Chapman, Chris, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:4589262024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fowler, Kevvie, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>DNS security : defending the domain name systement://SD_ILS/0/SD_ILS:4589352024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Liska, Allan, author. Stowe, Geoffrey, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:4589532024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:4589682024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Young, Carl S., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Coding for penetration testers : building better toolsent://SD_ILS/0/SD_ILS:4592172024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Andress, Jason, author. Linn, Ryan, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Guidelines for asset integrity managementent://SD_ILS/0/SD_ILS:4242712024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor American Institute of Chemical Engineers. Center for Chemical Process Safety, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1002/9781119364276">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:5134522024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA76.9.A25 E43 2016<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Disaster planning for libraries : process and guidelinesent://SD_ILS/0/SD_ILS:3553562024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Robertson, Guy, author.<br/>Preferred Shelf Number ONLINE(355356.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781843347309">http://www.sciencedirect.com/science/book/9781843347309</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:3553632024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Williams, Branden R., author. Chuvakin, Anton A., author. Milroy, Derek, editor<br/>Preferred Shelf Number ONLINE(355363.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The practical guide to HIPAA privacy and security complianceent://SD_ILS/0/SD_ILS:3564122024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Herold, Rebecca, author. Beaver, Kevin, author.<br/>Preferred Shelf Number ONLINE(356412.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439855591">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybervetting : Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:3564182024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Appel, Edward J., author.<br/>Preferred Shelf Number ONLINE(356418.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482238860">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Port security managementent://SD_ILS/0/SD_ILS:3564272024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Christopher, Kenneth, 1954- author.<br/>Preferred Shelf Number ONLINE(356427.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466591646">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical security and safety : a field guide for the practitionerent://SD_ILS/0/SD_ILS:3567872024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ricks, Truett A., editor. Ricks, Bobby E., editor. Dingle, Jeffrey, editor.<br/>Preferred Shelf Number ONLINE(356787.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482227031">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Preventing medical device recallsent://SD_ILS/0/SD_ILS:3569282024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Raheja, Dev, author.<br/>Preferred Shelf Number ONLINE(356928.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466568235">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data center handbookent://SD_ILS/0/SD_ILS:3420662024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Geng, Hwaiyu, editor.<br/>Preferred Shelf Number ONLINE(342066.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10992793">An electronic book accessible through the World Wide Web; click to view</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118937563">http://dx.doi.org/10.1002/9781118937563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing VoIP : keeping your VoIP network safeent://SD_ILS/0/SD_ILS:3554172024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bates, Regis J. author.<br/>Preferred Shelf Number ONLINE(355417.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CSA guide to cloud computing implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:3554492024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Samani, Raj, author. Honan, Brian, author. Reavis, Jim, author. Jirasek, Vladimir, editor. CSA (Organization), issuing body.<br/>Preferred Shelf Number ONLINE(355449.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart security : practices that increase business profits, proven practicesent://SD_ILS/0/SD_ILS:3557152024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Quilter, J. David, author.<br/>Preferred Shelf Number ONLINE(355715.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009277">http://www.sciencedirect.com/science/book/9780128009277</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009222">http://www.sciencedirect.com/science/book/9780128009222</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Case studies in secure computing : achievements and trendsent://SD_ILS/0/SD_ILS:3565042024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Issac, Biju, editor. Israr, Nauman, editor.<br/>Preferred Shelf Number ONLINE(356504.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482207071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Siber güvenlik ve elektronik bileşenlerient://SD_ILS/0/SD_ILS:3802812024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ünal, Ahmet Naci<br/>Preferred Shelf Number UG485 U53 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The Wiley handbook of psychology, technology and societyent://SD_ILS/0/SD_ILS:3871292024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Cheever, Nancy A., editor. Rosen, Larry D., editor. Carrier, L. Mark, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1002/9781118771952">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:3555142024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355514.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security analytics finding security insights, patterns, and anomalies in big dataent://SD_ILS/0/SD_ILS:3553882024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Preferred Shelf Number ONLINE(355388.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScriptent://SD_ILS/0/SD_ILS:3563672024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Glaser, J. D., author.<br/>Preferred Shelf Number ONLINE(356367.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482209044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android malware and analysisent://SD_ILS/0/SD_ILS:3564002024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Dunham, Ken, author. Hartman, Shane, author. Morales, Jose Andre, author. Quintans, Manu, author. Strazzere, Tim, author.<br/>Preferred Shelf Number ONLINE(356400.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482252200">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dissecting the hack : the v3rb0ten networkent://SD_ILS/0/SD_ILS:4586242024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deploymentsent://SD_ILS/0/SD_ILS:4586992024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Richter, Andy, author. Wood, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Networked Systems Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:5191672024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bouajjani, Ahmed. editor. Fauconnier, Hugues. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519167.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-26850-7">https://doi.org/10.1007/978-3-319-26850-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ağ ve yazılım güvenliğient://SD_ILS/0/SD_ILS:3797582024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Çontar, Furkan.<br/>Preferred Shelf Number TK5105.59 C66 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Siber istihbaratent://SD_ILS/0/SD_ILS:3840512024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Keleştemur, Atalay<br/>Preferred Shelf Number QA76.9.A25 K45 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Tam kapsamlı sanal test laboratuvarı kurulumu ve uygulamalı sızma testlerient://SD_ILS/0/SD_ILS:5134672024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Yalçınkaya, Mehmet Ali, yazar. Küçüksille, Ecir Uğur, yazar.<br/>Preferred Shelf Number TK5105.59 Y35 2015<br/>Format: Regular print<br/>Availability Beytepe Library~1<br/>Encyclopedia of Biometricsent://SD_ILS/0/SD_ILS:5184172024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Li, Stan Z. editor. Jain, Anil K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518417.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4899-7488-4">https://doi.org/10.1007/978-1-4899-7488-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Innovating for Healthy Urbanizationent://SD_ILS/0/SD_ILS:5200142024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ahn, Roy. editor. Burke, Thomas F. editor. McGahan, Anita M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520014.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4899-7597-3">https://doi.org/10.1007/978-1-4899-7597-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Distributed networks : intelligence, security, and applicationsent://SD_ILS/0/SD_ILS:2854082024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Memon, Qurban Ali, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network anomaly detection : a machine learning perspectiveent://SD_ILS/0/SD_ILS:2854132024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bhattacharyya, Dhruba K., author. Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy in smart gridsent://SD_ILS/0/SD_ILS:2863172024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Xiao, Yang, 1966-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439877845">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conflict and cooperation in cyberspace : the challenge to national securityent://SD_ILS/0/SD_ILS:2863322024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Yannakogeorgos, Panayotis A., editor. Lowther, Adam, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:3419972024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Securityent://SD_ILS/0/SD_ILS:3421682024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Industrial espionage : developing a counterespionage programent://SD_ILS/0/SD_ILS:3425882024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Benny, Daniel J., author.<br/>Preferred Shelf Number ONLINE(342588.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466568150">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developing and securing the cloudent://SD_ILS/0/SD_ILS:3426312024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number ONLINE(342631.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439862926">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security management a critical thinking approachent://SD_ILS/0/SD_ILS:3428452024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Preferred Shelf Number ONLINE(342845.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software test attacks to break mobile and embedded devicesent://SD_ILS/0/SD_ILS:3428682024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hagar, Jon Duncan, author.<br/>Preferred Shelf Number ONLINE(342868.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:3428862024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor DeFranco, Joanna F., author.<br/>Preferred Shelf Number ONLINE(342886.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical layer security in wireless communicationsent://SD_ILS/0/SD_ILS:3428872024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Zhou, Xiangyun Sean, editor. Song, Lingyang, editor. Zhang, Yan, 1977- editor.<br/>Preferred Shelf Number ONLINE(342887.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466567016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure Messaging on the Internetent://SD_ILS/0/SD_ILS:3549372024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Oppliger, Rolf.<br/>Preferred Shelf Number TK5105.73 O67 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systemsent://SD_ILS/0/SD_ILS:3553522024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Knapp, Eric D. Langill, Joel Thomas.<br/>Preferred Shelf Number ONLINE(355352.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Personnel protection : residential security, proven practicesent://SD_ILS/0/SD_ILS:3557162024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Miller, Jerome, author. Jones, Radford, author.<br/>Preferred Shelf Number ONLINE(355716.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009284">http://www.sciencedirect.com/science/book/9780128009284</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:3557702024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance : the definitive guideent://SD_ILS/0/SD_ILS:3564232024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bhargav, Abhay, author.<br/>Preferred Shelf Number ONLINE(356423.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439887417">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:3565562024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number ONLINE(356556.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion detection in wireless ad-hoc networksent://SD_ILS/0/SD_ILS:3564772024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Chaki, Nabendu, editor. Chaki, Rituparna, editor.<br/>Preferred Shelf Number ONLINE(356477.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466515673">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The frugal CISO : using innovation and smart approaches to maximize your security postureent://SD_ILS/0/SD_ILS:3566242024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Anderson, Kerry Ann, author.<br/>Preferred Shelf Number ONLINE(356624.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:3566572024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Peng, Kun, author.<br/>Preferred Shelf Number ONLINE(356657.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:3566812024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number ONLINE(356681.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for multihop wireless networksent://SD_ILS/0/SD_ILS:3569162024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Khan, Shafiullah, editor. Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number ONLINE(356916.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data protection for photographers : a guide to storing and protecting your valuable digital assetsent://SD_ILS/0/SD_ILS:3642422024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Corrigan, Patrick H.<br/>Preferred Shelf Number TK7895.M4 C67 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Network and system securityent://SD_ILS/0/SD_ILS:3066902024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing information securityent://SD_ILS/0/SD_ILS:3066922024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Total information risk management maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:3066932024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Borek, Alexander.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:3066952024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>The deadly life of logistics mapping the violence of global tradeent://SD_ILS/0/SD_ILS:3236192024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Cowen, Deborah. Project Muse.<br/>Preferred Shelf Number ONLINE(323619.1)<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781452943183/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Unmaking the bomb a fissile material approach to nuclear disarmament and nonproliferationent://SD_ILS/0/SD_ILS:3237352024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Feiveson, Harold A. Von Hippel, Frank. Mian, Zia. Glaser, Alexander, 1969- Project Muse.<br/>Preferred Shelf Number ONLINE(323735.1)<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780262319188/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Chinese cybersecurity and cyberdefenseent://SD_ILS/0/SD_ILS:3421552024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ventre, Daniel.<br/>Preferred Shelf Number ONLINE(342155.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a>
MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3542322024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:3554502024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tourism security strategies for effectively managing travel risk and safetyent://SD_ILS/0/SD_ILS:3557362024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Tarlow, Peter E.<br/>Preferred Shelf Number ONLINE(355736.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124115705">http://www.sciencedirect.com/science/book/9780124115705</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of digital privacy simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:3561232024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Cherry, Denny. LaRock, Thomas.<br/>Preferred Shelf Number ONLINE(356123.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:3565162024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number ONLINE(356516.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Resource optimization and security for cloud servicesent://SD_ILS/0/SD_ILS:3419792024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Xiong, Kaiqi, author.<br/>Preferred Shelf Number ONLINE(341979.1)<br/>Electronic Access MyiLibrary <a href="http://www.myilibrary.com?id=578586">http://www.myilibrary.com?id=578586</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118898598">http://dx.doi.org/10.1002/9781118898598</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:3419802024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bank fraud : using technology to combat lossesent://SD_ILS/0/SD_ILS:3419422024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Subramanian, Revathi, author.<br/>Preferred Shelf Number ONLINE(341942.1)<br/>Electronic Access Bloomberg Law <a href="https://www.bloomberglaw.com/browser/105.491080">https://www.bloomberglaw.com/browser/105.491080</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=63460">http://www.books24x7.com/marc.asp?bookid=63460</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz405667086cov.htm">http://swbplus.bsz-bw.de/bsz405667086cov.htm</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=836562">http://public.eblib.com/choice/publicfullrecord.aspx?p=836562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data analysis for network cyber-securityent://SD_ILS/0/SD_ILS:3547572024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:3555752024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355575.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The handbook for school safety and security : best practices and proceduresent://SD_ILS/0/SD_ILS:3555802024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fennelly, Lawrence J., 1940- editor. Perry, Marianna A., editor.<br/>Preferred Shelf Number ONLINE(355580.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005682">http://www.sciencedirect.com/science/book/9780128005682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for business professionals how to plan, implement, and manage your company's security programent://SD_ILS/0/SD_ILS:3556032024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Wayland, Bradley A., author.<br/>Preferred Shelf Number ONLINE(355603.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005651">http://www.sciencedirect.com/science/book/9780128005651</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building an information security awareness program defending against social engineering and technical threatsent://SD_ILS/0/SD_ILS:3556182024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Gardner, Bill (Bill G.) Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number ONLINE(355618.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:3558532024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safeguarding cultural properties : security for museums, libraries, parks, and zoosent://SD_ILS/0/SD_ILS:3558642024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Layne, Stevan P., author.<br/>Preferred Shelf Number ONLINE(355864.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201125">http://www.sciencedirect.com/science/book/9780124201125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Workplace security essentials a guide for helping organizations create safe work environmentsent://SD_ILS/0/SD_ILS:3558972024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Smith, Eric N. (Eric Newell), 1967-<br/>Preferred Shelf Number ONLINE(355897.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124165571">http://www.sciencedirect.com/science/book/9780124165571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The manager's handbook for business securityent://SD_ILS/0/SD_ILS:3559082024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Campbell, George, 1942-<br/>Preferred Shelf Number ONLINE(355908.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000625">http://www.sciencedirect.com/science/book/9780128000625</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security careers skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:3560432024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:3563962024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number ONLINE(356396.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:1456902024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:1459362024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Gantz, Stephen D. Philpott, Daniel R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:1469342024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Tam, Kenneth.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in cyber security technology, operations, and experiencesent://SD_ILS/0/SD_ILS:2395912024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime security in Southeast Asiaent://SD_ILS/0/SD_ILS:2395772024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bradford, John F. National Bureau of Asian Research (U.S.) Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to securityent://SD_ILS/0/SD_ILS:2701302024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fischer, Robert J. Halibozek, Edward P. Walters, David, 1963-<br/>Preferred Shelf Number HV8290 G74 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Strategic intelligence management : national security imperatives and information and communications technologiesent://SD_ILS/0/SD_ILS:2703632024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Akhgar, Babak. Yates, Simeon.<br/>Preferred Shelf Number TK5102.85 A44 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Multimedia security watermarking, steganography, and forensicsent://SD_ILS/0/SD_ILS:2871512024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Shih, Frank Y.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439873328">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android security attacks and defensesent://SD_ILS/0/SD_ILS:2871932024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Misra, Anmol.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)[superscript 2] guide to the CAP CBKent://SD_ILS/0/SD_ILS:2880562024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Williams, Barry L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:2906672024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Baker, Paul, 1958- Benny, Daniel J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network attacks and defenses a hands-on approachent://SD_ILS/0/SD_ILS:2909242024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Trabelsi, Zouheir.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466517974">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Antiterrorism and threat response planning and implementationent://SD_ILS/0/SD_ILS:2909462024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Johnson, Ross.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466512917">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CBRN and hazmat incidents at major public events : planning and responseent://SD_ILS/0/SD_ILS:2679622024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Kaszeta, Dan.<br/>Preferred Shelf Number WA 295 K1911 2013<br/>Format: Books<br/>Availability Health Sciences Library~1<br/>Structure preserving energy functions in power systems theory and applicationsent://SD_ILS/0/SD_ILS:2890672024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Padiyar, K. R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439879382">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipesent://SD_ILS/0/SD_ILS:3130442024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fadyushin, Vyacheslav.<br/>Preferred Shelf Number ONLINE(313044.1)<br/>Electronic Access Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Combating climate change an agricultural perspectiveent://SD_ILS/0/SD_ILS:2853872024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Kang, Manjit S., editor of compilation. Banga, S. S. (Surinder S.), editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466566712">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:2863072024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:2881552024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Supply chain security a comprehensive approachent://SD_ILS/0/SD_ILS:2881562024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Arway, Arthur G.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466511903">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:2881602024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Khoury, Franjieh El.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical infrastructure homeland security and emergency preparednessent://SD_ILS/0/SD_ILS:2881612024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Radvanovsky, Robert. McDougall, Allan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466503465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>General aviation security aircraft, hangars, fixed-base operations, flight schools, and airportsent://SD_ILS/0/SD_ILS:2899582024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Benny, Daniel J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466510883">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing cloud and mobility a practitioner's guideent://SD_ILS/0/SD_ILS:2900012024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Lim, Ian. Hourani, Paul. Coolidge, E. Coleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439850572">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical infrastructure system security and resiliencyent://SD_ILS/0/SD_ILS:2917272024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Biringer, Betty E., 1952- Vugrin, Eric D. Warren, Drake E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466557512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing cloud and mobility a practitioner's guideent://SD_ILS/0/SD_ILS:3428392024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Lim, Ian. Hourani, Paul. Coolidge, E. Coleen.<br/>Preferred Shelf Number ONLINE(342839.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466550827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:3066402024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Kotwica, Kathleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Aligning security services with business objectives proven practicesent://SD_ILS/0/SD_ILS:3066422024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Lefler, Richard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170087">http://www.sciencedirect.com/science/book/9780124170087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Corporate security organizational structure, cost of services and staffing benchmark research report / Bob Hayes, Greg Kane, Kathleen Kotwica.ent://SD_ILS/0/SD_ILS:3066472024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hayes, Bob E., 1963- Kane, Greg. Kotwica, Kathleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170025">http://www.sciencedirect.com/science/book/9780124170025</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information protection playbookent://SD_ILS/0/SD_ILS:3066492024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:3066912024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:3064602024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied network security monitoring collection, detection, and analysisent://SD_ILS/0/SD_ILS:3561222024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sanders, Chris. Smith, Jason.<br/>Preferred Shelf Number ONLINE(356122.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:3442632024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Handbook on securing cyber-physical critical infrastructureent://SD_ILS/0/SD_ILS:1455792024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:1462742024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:1485162024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:1452542024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:1481612024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of loss prevention and crime preventionent://SD_ILS/0/SD_ILS:1481752024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123852465">http://www.sciencedirect.com/science/book/9780123852465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:1487312024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Oriyano, Sean-Philip. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:1460562024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The hacker's guide to OS X exploiting OS X from the root upent://SD_ILS/0/SD_ILS:1480062024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:1484292024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Chuvakin, Anton. Williams, Branden R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Risk analysis and the security surveyent://SD_ILS/0/SD_ILS:1490622024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Broder, James F. Tucker, Eugene.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123822338">http://www.sciencedirect.com/science/book/9780123822338</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISSP study guideent://SD_ILS/0/SD_ILS:1487692024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2418372024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ending campus violence new approaches to preventionent://SD_ILS/0/SD_ILS:2599552024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Van Brunt, Brian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203149560">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime private security market responses to piracy, terrorism and waterborne security risks in the 21st centuryent://SD_ILS/0/SD_ILS:2607192024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Berube, Claude G., 1966- Cullen, Patrick, 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203126608">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The early years health and safety handbookent://SD_ILS/0/SD_ILS:2622762024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Parker, Lynn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203809662">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:2700332024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Handbook of loss prevention and crime preventionent://SD_ILS/0/SD_ILS:2700432024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number HV8290 H345 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Jakobsson, Markus.<br/>Preferred Shelf Number TK5105.875.I57 D43 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:2852492024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Paul, Goutam. Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:2871022024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Masud, Mehedy. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISO's guide to penetration testing a framework to plan, manage, and maximize benefitsent://SD_ILS/0/SD_ILS:2871052024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439880289">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart grid security an end-to-end view of security in the new electrical grident://SD_ILS/0/SD_ILS:2880302024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sorebo, Gilbert. Echols, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439855898">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:2889932024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ganguly, Debashis. Lahiri, Shibamouli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502451">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security governance simplified from the boardroom to the keyboardent://SD_ILS/0/SD_ILS:2906622024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Fitzgerald, Todd.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439811658">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Defense against the black arts how hackers do what they do and how to protect against itent://SD_ILS/0/SD_ILS:2915812024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Varsalone, Jesse. McFadden, Matthew. Morrissey, Sean.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:2915822024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439837221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Competition and efficiency in international food supply chains improving food securityent://SD_ILS/0/SD_ILS:2608102024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Williams, John, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203122365">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RFID in libraries a step toward interoperabilityent://SD_ILS/0/SD_ILS:2810692024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ayre, Lori Bowen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Justice and security in the 21st century risks, rights and the rule of lawent://SD_ILS/0/SD_ILS:2597352024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ugelvik, Synnøve, 1978- Hudson, Barbara, 1945-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203125588">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime piracyent://SD_ILS/0/SD_ILS:2609022024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Haywood, Robert. Spivak, Roberta.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203144817">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2767002024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless network security a beginner's guideent://SD_ILS/0/SD_ILS:2932302024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Wrightson, Tyler.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/wireless-network-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security metrics a beginner's guideent://SD_ILS/0/SD_ILS:2932382024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the clicks network security in the age of social mediaent://SD_ILS/0/SD_ILS:2932402024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle WebLogic server 11g administration handbookent://SD_ILS/0/SD_ILS:2932432024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Alapati, Sam R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>iPhone geekery 50 insanely cool hacks and mods for your iPhone 4Sent://SD_ILS/0/SD_ILS:2934462024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/iphone-geekery-50-insanely-cool-hacks-mods-for-your-4s">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Photonic sensing principles and applications for safety and security monitoringent://SD_ILS/0/SD_ILS:2993652024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Xiao, George. Bock, Wojtek J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118310205">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118310212">http://dx.doi.org/10.1002/9781118310212</a>
ebrary <a href="http://site.ebrary.com/id/10602117">http://site.ebrary.com/id/10602117</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118310205">http://proquest.tech.safaribooksonline.de/9781118310205</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computingent://SD_ILS/0/SD_ILS:2795142024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Weber, Stefan G. IOS Press.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Robust control system networks how to achieve reliable control after Stuxnetent://SD_ILS/0/SD_ILS:2801812024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Langner, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:2861362024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Speed, Tyler Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:2861402024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Macaulay, Tyson. Singer, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439801987">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:2862022024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Andreasson, Kim J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing the insider threat no dark cornersent://SD_ILS/0/SD_ILS:2908132024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Catrantzos, Nick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439872932">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ports in a storm : public management in a turbulent worldent://SD_ILS/0/SD_ILS:3764012024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Donahue, John D. Moore, Mark H., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.7864/j.ctt12636r">http://www.jstor.org/stable/10.7864/j.ctt12636r</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How Ottawa spends, 2012-2013 : the Harper majority, budget cuts, and the new oppositionent://SD_ILS/0/SD_ILS:3769632024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Doern, G. Bruce. Stoney, Christopher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt1pq1f8">http://www.jstor.org/stable/10.2307/j.ctt1pq1f8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security aspects of uni-and multimodal hazmat transportation systemsent://SD_ILS/0/SD_ILS:3062652024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Reniers, Genserik L. L. Zamparini, Luca.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9783527664818">http://onlinelibrary.wiley.com/book/10.1002/9783527664818</a>
Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527664818">http://dx.doi.org/10.1002/9783527664818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Motor fleet safety and security managementent://SD_ILS/0/SD_ILS:2900222024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Della-Giustina, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439895085">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Operating systems demystifiedent://SD_ILS/0/SD_ILS:2941012024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Against security : how we go wrong at airports, subways, and other sites of ambiguous dangerent://SD_ILS/0/SD_ILS:3767132024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Molotch, Harvey Luskin, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.cttq94nr">http://www.jstor.org/stable/10.2307/j.cttq94nr</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ninja hacking unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:1462632024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Wilhelm, Thomas. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective security managementent://SD_ILS/0/SD_ILS:1464712024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sennewald, Charles A., 1931-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123820129">http://www.sciencedirect.com/science/book/9780123820129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Eleventh hour CISSP study guideent://SD_ILS/0/SD_ILS:1465972024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Thor's Microsoft security bible a collection of practical security techniquesent://SD_ILS/0/SD_ILS:1468082024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Mullen, Timothy M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber warfare techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:1474792024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Andress, Jason. Winterfeld, Steve. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:1487852024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Andress, Jason. Linn, Ryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1489802024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the smart grid next generation power grid securityent://SD_ILS/0/SD_ILS:1491442024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Flick, Tony. Morehouse, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495707">http://www.sciencedirect.com/science/book/9781597495707</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:1491722024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Wheeler, Evan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android forensics investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1452532024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hoog, Andrew. McCash, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:1454572024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Knapp, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:1456592024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:1482252024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Faircloth, Jeremy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:2443122024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Our biometric future facial recognition technology and the culture of surveillanceent://SD_ILS/0/SD_ILS:2438222024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Gates, Kelly. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780814732793/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nuclear energy and global governance ensuring safety, security, and non-proliferationent://SD_ILS/0/SD_ILS:2625362024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Findlay, Trevor, 1951-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203834503">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The securitization of migration a study of movement and orderent://SD_ILS/0/SD_ILS:2653362024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bourbeau, Philippe, 1972 Nov. 3-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203829349">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Guide to physical security planning & response for hospitals, medical, long term care facilitiesent://SD_ILS/0/SD_ILS:2786362024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Russell, Mary, 1953- Kendig, Jim. Philpott, Don, 1946-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Guidelines for the physical security of water utilities, ANSI/ASCE/EWRI 56-10 Guidelines for the physical security of wastewater/stormwater utilities, ANSI/ASCE/EWRI 57-10ent://SD_ILS/0/SD_ILS:2793192024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor American Society of Civil Engineers. Environmental and Water Resources Institute (U.S.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Staying safe at schoolent://SD_ILS/0/SD_ILS:2870842024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Quarles, Chester L. Quarles, Tammy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439858295">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless securityent://SD_ILS/0/SD_ILS:2881102024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Osterhage, Wolfgang.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439896266">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:2884512024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Stackpole, Bill. Oksendahl, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and policy driven computingent://SD_ILS/0/SD_ILS:2888792024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Liu, Lei, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2888902024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Landoll, Douglas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Casino security and gaming surveillanceent://SD_ILS/0/SD_ILS:2888952024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Boss, Derk J. Zajic, Alan W.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420087833">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:2915712024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Scherling, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Readings and cases in information security : law and ethicsent://SD_ILS/0/SD_ILS:2677432024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Whitman, Michael E. Mattord, Herbert J.<br/>Preferred Shelf Number TK5105.878 W54 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Effective security managementent://SD_ILS/0/SD_ILS:2699682024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Sennewald, Charles A.<br/>Preferred Shelf Number HV8290 S46 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Network security firewalls and VPNsent://SD_ILS/0/SD_ILS:2714522024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Stewart, James Michael.<br/>Preferred Shelf Number TK5105.59 S758 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Guide to security considerations and practices for rare book, manuscript, and special collection librariesent://SD_ILS/0/SD_ILS:2800942024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Wilkie, Everett C. Association of College and Research Libraries.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure semantic service-oriented systemsent://SD_ILS/0/SD_ILS:2851052024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420073324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure Java for web application developmentent://SD_ILS/0/SD_ILS:2851662024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Bhargav, Abhay. Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439823569">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Tibble, Ian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Terrorism and the Olympics major event security and lessons for the futureent://SD_ILS/0/SD_ILS:2653692024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Richards, Anthony. Fussey, Peter. Silke, Andrew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203835227">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing global transportation networks a total security management approachent://SD_ILS/0/SD_ILS:2931692024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Ritter, Luke. Barrett, J. Michael. Wilson, Rosalyn A. Ridge, Thomas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-global-transportation-networks">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Architectural security codes and guidelines best practices for today's construction challengesent://SD_ILS/0/SD_ILS:2931732024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Wible, Robert C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/architectural-security-codes-guidelines">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle Fusion middleware 11g architecture and managementent://SD_ILS/0/SD_ILS:2932522024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft SQL server 2008 R2 master data services implementation & administrationent://SD_ILS/0/SD_ILS:2932612024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Graham, Tyler. Selhorn, Suzanne.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-r2-master-data-services">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Master data management and data governanceent://SD_ILS/0/SD_ILS:2932672024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Berson, Alex. Dubov, Lawrence. Berson, Alex. Master data management and customer data integration for a global enterprise.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/master-data-management-governance-2e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>iPad & iPhone administrator's guide enterprise deployment strategies and security solutionsent://SD_ILS/0/SD_ILS:2932682024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/ipad-iphone-administrators-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed web applications web application security secrets and solutionsent://SD_ILS/0/SD_ILS:2932772024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security information and event management (SIEM) implementationent://SD_ILS/0/SD_ILS:2932792024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:2932892024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mac OS X system administrationent://SD_ILS/0/SD_ILS:2932982024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed wireless wireless security secrets & solutionsent://SD_ILS/0/SD_ILS:2933002024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless network administration a beginner's guideent://SD_ILS/0/SD_ILS:2933052024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Soyinka, Wale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/wireless-network-administration-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile application securityent://SD_ILS/0/SD_ILS:2933122024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Networking a beginner's guideent://SD_ILS/0/SD_ILS:2933142024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle WebCenter 11g handbook build rich, customizable enterprise 2.0 applicationsent://SD_ILS/0/SD_ILS:2933162024-11-23T13:01:13Z2024-11-23T13:01:13ZAuthor Desbiens, Fr�ed�eric. Moskovits, Peter. Weckerle, Philipp.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-webcenter-11g-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>