Search Results for Security Measures. - Narrowed by: EnglishSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026te$003dILS$0026ps$003d300?2024-11-03T00:44:40ZMeasures and metrics in corporate securityent://SD_ILS/0/SD_ILS:3559522024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Campbell, George, 1942- author.<br/>Preferred Shelf Number ONLINE(355952.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006887">http://www.sciencedirect.com/science/book/9780128006887</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building a security measures and metrics program proven practicesent://SD_ILS/0/SD_ILS:3066432024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Campbell, George.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170070">http://www.sciencedirect.com/science/book/9780124170070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial Intelligence and Cyber Security in Industry 4.0ent://SD_ILS/0/SD_ILS:5204622024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Sarveshwaran, Velliangiri. editor. Chen, Joy Iong-Zong. editor. Pelusi, Danilo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520462.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2115-7">https://doi.org/10.1007/978-981-99-2115-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Data and Social Networks 11th International Conference, CSoNet 2022, Virtual Event, December 5-7, 2022, Proceedingsent://SD_ILS/0/SD_ILS:5208132024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Dinh, Thang N. editor. Li, Minming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520813.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-26303-3">https://doi.org/10.1007/978-3-031-26303-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptographic security solutions for the internet of thingsent://SD_ILS/0/SD_ILS:4817712024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Banday, Mohammad Tariq, 1969- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Exploring security in software architecture and designent://SD_ILS/0/SD_ILS:4818712024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity education for awareness and complianceent://SD_ILS/0/SD_ILS:4820922024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Vasileiou, Ismini, 1980- editor. Furnell, Steven, 1970- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4831122024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Nandi, Sukumar. editor. Jinwala, Devesh. editor. Singh, Virendra. editor. Laxmi, Vijay. editor. Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4848462024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bassioni, Ghada. editor. Kebe, Cheikh M.F. editor. Gueye, Assane. editor. (orcid)0000-0001-6469-4716 Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4848472024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Askarov, Aslan. editor. Hansen, René Rydhof. editor. Rafnsson, Willard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4849082024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cloud security : concepts, methodologies, tools, and applicationsent://SD_ILS/0/SD_ILS:4821632024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor IGI Global, publisher. Information Resources Management Association.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering cyber attacks and preserving the integrity and availability of critical systemsent://SD_ILS/0/SD_ILS:4821772024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4838892024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Meng, Weizhi. editor. (orcid)0000-0003-4384-5786 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4845182024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberdanger Understanding and Guarding Against Cybercrimeent://SD_ILS/0/SD_ILS:4859362024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial intelligence and security challenges in emerging networksent://SD_ILS/0/SD_ILS:4819752024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced methodologies and technologies in system security, information privacy, and forensicsent://SD_ILS/0/SD_ILS:4820092024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crimeent://SD_ILS/0/SD_ILS:4830132024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4840472024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4869442024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4821132024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Gunasekhar, T., 1990- author. Rao, K. Thirupathi, author. Kiran, P. Sai, author. Krishna Reddy, V., author. Rao, B. Thirumala, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning and cognitive science applications in cyber securityent://SD_ILS/0/SD_ILS:4821512024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security and its impact on business strategyent://SD_ILS/0/SD_ILS:4822132024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4833662024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cid, Carlos. editor. (orcid)0000-0001-5761-8694 Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4841862024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safe mobility : challenges, methodology and solutionsent://SD_ILS/0/SD_ILS:4220842024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Lord, Dominique, 1969- editor. Washington, Simon, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://www.emerald.com/insight/publication/doi/10.1108/S2044-9941201811">https://www.emerald.com/insight/publication/doi/10.1108/S2044-9941201811</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001862024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Chowdhury, Kaushik Roy. editor. Di Felice, Marco. editor. Matta, Ibrahim. editor. Sheng, Bo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tourism oriented policing and protective servicesent://SD_ILS/0/SD_ILS:4820302024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Tarlow, Peter E., author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7579-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7579-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001072024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4003062024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Budaghyan, Lilya. editor. Rodríguez-Henríquez, Francisco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Wiley handbook on violence in education : forms, factors, and preventionsent://SD_ILS/0/SD_ILS:4241502024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Shapiro, Harvey, 1952- editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1002/9781118966709">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:4590442024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Sammons, John, author. Cross, Michael, 1965- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:4592042024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:4595182024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Vacca, John R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safety of web applications : risks, encryption and handling vulnerabilities with PHPent://SD_ILS/0/SD_ILS:4594672024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Quinton, Éric, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:4593352024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Federal cloud computing : the definitive guide for cloud service providersent://SD_ILS/0/SD_ILS:4593382024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Metheny, Matthew, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128097106">http://www.sciencedirect.com/science/book/9780128097106</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking wireless access points : cracking, tracking, and signal jackingent://SD_ILS/0/SD_ILS:4592992024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Kurtz, Jennifer Ann, author. Kaczmarek, Richard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128053157">http://www.sciencedirect.com/science/book/9780128053157</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in network functions virtualizationent://SD_ILS/0/SD_ILS:4599012024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Zhang, Zonghua, author. Meddahi, Ahmed, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:4591002024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Macaulay, Tyson, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199712">http://www.sciencedirect.com/science/book/9780124199712</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:4591142024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Faircloth, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:4591222024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Au, Man-Ho, editor. Choo, Raymond Kim-Kwang, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128046296">https://www.sciencedirect.com/science/book/9780128046296</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:4591452024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building a practical information security programent://SD_ILS/0/SD_ILS:4591462024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:4586652024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Automated security analysis of Android and iOS applications with mobile security frameworkent://SD_ILS/0/SD_ILS:4586942024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Abraham, Ajin, author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128047187">https://www.sciencedirect.com/science/book/9780128047187</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:4587772024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:4587892024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Chapman, Chris, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:4589262024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fowler, Kevvie, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>DNS security : defending the domain name systement://SD_ILS/0/SD_ILS:4589352024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Liska, Allan, author. Stowe, Geoffrey, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:4589532024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:4589682024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Young, Carl S., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Eleventh Hour CISSP®ent://SD_ILS/0/SD_ILS:4590732024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Conrad, Eric, author. Seth Misenar, author. Joshua Feldman, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Coding for penetration testers : building better toolsent://SD_ILS/0/SD_ILS:4592172024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Andress, Jason, author. Linn, Ryan, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Guidelines for asset integrity managementent://SD_ILS/0/SD_ILS:4242712024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor American Institute of Chemical Engineers. Center for Chemical Process Safety, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1002/9781119364276">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Wiley handbook of psychology, technology and societyent://SD_ILS/0/SD_ILS:3871292024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cheever, Nancy A., editor. Rosen, Larry D., editor. Carrier, L. Mark, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1002/9781118771952">Wiley Online Library</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data center handbookent://SD_ILS/0/SD_ILS:3420662024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Geng, Hwaiyu, editor.<br/>Preferred Shelf Number ONLINE(342066.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10992793">An electronic book accessible through the World Wide Web; click to view</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118937563">http://dx.doi.org/10.1002/9781118937563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The practical guide to HIPAA privacy and security complianceent://SD_ILS/0/SD_ILS:3564122024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Herold, Rebecca, author. Beaver, Kevin, author.<br/>Preferred Shelf Number ONLINE(356412.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439855591">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybervetting : Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:3564182024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Appel, Edward J., author.<br/>Preferred Shelf Number ONLINE(356418.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482238860">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Port security managementent://SD_ILS/0/SD_ILS:3564272024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Christopher, Kenneth, 1954- author.<br/>Preferred Shelf Number ONLINE(356427.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466591646">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Case studies in secure computing : achievements and trendsent://SD_ILS/0/SD_ILS:3565042024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Issac, Biju, editor. Israr, Nauman, editor.<br/>Preferred Shelf Number ONLINE(356504.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482207071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing VoIP : keeping your VoIP network safeent://SD_ILS/0/SD_ILS:3554172024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bates, Regis J. author.<br/>Preferred Shelf Number ONLINE(355417.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disaster planning for libraries : process and guidelinesent://SD_ILS/0/SD_ILS:3553562024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Robertson, Guy, author.<br/>Preferred Shelf Number ONLINE(355356.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781843347309">http://www.sciencedirect.com/science/book/9781843347309</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:3553632024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Williams, Branden R., author. Chuvakin, Anton A., author. Milroy, Derek, editor<br/>Preferred Shelf Number ONLINE(355363.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security analytics finding security insights, patterns, and anomalies in big dataent://SD_ILS/0/SD_ILS:3553882024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Preferred Shelf Number ONLINE(355388.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:3555142024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355514.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CSA guide to cloud computing implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:3554492024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Samani, Raj, author. Honan, Brian, author. Reavis, Jim, author. Jirasek, Vladimir, editor. CSA (Organization), issuing body.<br/>Preferred Shelf Number ONLINE(355449.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart security : practices that increase business profits, proven practicesent://SD_ILS/0/SD_ILS:3557152024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Quilter, J. David, author.<br/>Preferred Shelf Number ONLINE(355715.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009277">http://www.sciencedirect.com/science/book/9780128009277</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009222">http://www.sciencedirect.com/science/book/9780128009222</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScriptent://SD_ILS/0/SD_ILS:3563672024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Glaser, J. D., author.<br/>Preferred Shelf Number ONLINE(356367.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482209044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android malware and analysisent://SD_ILS/0/SD_ILS:3564002024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Dunham, Ken, author. Hartman, Shane, author. Morales, Jose Andre, author. Quintans, Manu, author. Strazzere, Tim, author.<br/>Preferred Shelf Number ONLINE(356400.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482252200">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical security and safety : a field guide for the practitionerent://SD_ILS/0/SD_ILS:3567872024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ricks, Truett A., editor. Ricks, Bobby E., editor. Dingle, Jeffrey, editor.<br/>Preferred Shelf Number ONLINE(356787.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482227031">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Preventing medical device recallsent://SD_ILS/0/SD_ILS:3569282024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Raheja, Dev, author.<br/>Preferred Shelf Number ONLINE(356928.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466568235">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dissecting the hack : the v3rb0ten networkent://SD_ILS/0/SD_ILS:4586242024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deploymentsent://SD_ILS/0/SD_ILS:4586992024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Richter, Andy, author. Wood, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Networked Systems Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:5191672024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bouajjani, Ahmed. editor. Fauconnier, Hugues. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(519167.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-26850-7">https://doi.org/10.1007/978-3-319-26850-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Innovating for Healthy Urbanizationent://SD_ILS/0/SD_ILS:5200142024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ahn, Roy. editor. Burke, Thomas F. editor. McGahan, Anita M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520014.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4899-7597-3">https://doi.org/10.1007/978-1-4899-7597-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Biometricsent://SD_ILS/0/SD_ILS:5184172024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Li, Stan Z. editor. Jain, Anil K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518417.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4899-7488-4">https://doi.org/10.1007/978-1-4899-7488-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bank fraud : using technology to combat lossesent://SD_ILS/0/SD_ILS:3419422024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Subramanian, Revathi, author.<br/>Preferred Shelf Number ONLINE(341942.1)<br/>Electronic Access Bloomberg Law <a href="https://www.bloomberglaw.com/browser/105.491080">https://www.bloomberglaw.com/browser/105.491080</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=63460">http://www.books24x7.com/marc.asp?bookid=63460</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz405667086cov.htm">http://swbplus.bsz-bw.de/bsz405667086cov.htm</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=836562">http://public.eblib.com/choice/publicfullrecord.aspx?p=836562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Chinese cybersecurity and cyberdefenseent://SD_ILS/0/SD_ILS:3421552024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ventre, Daniel.<br/>Preferred Shelf Number ONLINE(342155.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a>
MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Industrial espionage : developing a counterespionage programent://SD_ILS/0/SD_ILS:3425882024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Benny, Daniel J., author.<br/>Preferred Shelf Number ONLINE(342588.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466568150">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developing and securing the cloudent://SD_ILS/0/SD_ILS:3426312024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number ONLINE(342631.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439862926">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3542322024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Secure Messaging on the Internetent://SD_ILS/0/SD_ILS:3549372024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Oppliger, Rolf.<br/>Preferred Shelf Number TK5105.73 O67 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Safeguarding cultural properties : security for museums, libraries, parks, and zoosent://SD_ILS/0/SD_ILS:3558642024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Layne, Stevan P., author.<br/>Preferred Shelf Number ONLINE(355864.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201125">http://www.sciencedirect.com/science/book/9780124201125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security careers skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:3560432024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance : the definitive guideent://SD_ILS/0/SD_ILS:3564232024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bhargav, Abhay, author.<br/>Preferred Shelf Number ONLINE(356423.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439887417">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion detection in wireless ad-hoc networksent://SD_ILS/0/SD_ILS:3564772024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Chaki, Nabendu, editor. Chaki, Rituparna, editor.<br/>Preferred Shelf Number ONLINE(356477.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466515673">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for multihop wireless networksent://SD_ILS/0/SD_ILS:3569162024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Khan, Shafiullah, editor. Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number ONLINE(356916.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Network Securityent://SD_ILS/0/SD_ILS:3421682024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:3555752024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355575.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:3554502024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for business professionals how to plan, implement, and manage your company's security programent://SD_ILS/0/SD_ILS:3556032024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Wayland, Bradley A., author.<br/>Preferred Shelf Number ONLINE(355603.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005651">http://www.sciencedirect.com/science/book/9780128005651</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building an information security awareness program defending against social engineering and technical threatsent://SD_ILS/0/SD_ILS:3556182024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Gardner, Bill (Bill G.) Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number ONLINE(355618.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Workplace security essentials a guide for helping organizations create safe work environmentsent://SD_ILS/0/SD_ILS:3558972024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Smith, Eric N. (Eric Newell), 1967-<br/>Preferred Shelf Number ONLINE(355897.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124165571">http://www.sciencedirect.com/science/book/9780124165571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The manager's handbook for business securityent://SD_ILS/0/SD_ILS:3559082024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Campbell, George, 1942-<br/>Preferred Shelf Number ONLINE(355908.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000625">http://www.sciencedirect.com/science/book/9780128000625</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of digital privacy simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:3561232024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cherry, Denny. LaRock, Thomas.<br/>Preferred Shelf Number ONLINE(356123.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Distributed networks : intelligence, security, and applicationsent://SD_ILS/0/SD_ILS:2854082024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Memon, Qurban Ali, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network anomaly detection : a machine learning perspectiveent://SD_ILS/0/SD_ILS:2854132024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bhattacharyya, Dhruba K., author. Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network and system securityent://SD_ILS/0/SD_ILS:3066902024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing information securityent://SD_ILS/0/SD_ILS:3066922024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Total information risk management maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:3066932024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Borek, Alexander.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:3066952024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The deadly life of logistics mapping the violence of global tradeent://SD_ILS/0/SD_ILS:3236192024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cowen, Deborah. Project Muse.<br/>Preferred Shelf Number ONLINE(323619.1)<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781452943183/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Unmaking the bomb a fissile material approach to nuclear disarmament and nonproliferationent://SD_ILS/0/SD_ILS:3237352024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Feiveson, Harold A. Von Hippel, Frank. Mian, Zia. Glaser, Alexander, 1969- Project Muse.<br/>Preferred Shelf Number ONLINE(323735.1)<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780262319188/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Resource optimization and security for cloud servicesent://SD_ILS/0/SD_ILS:3419792024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Xiong, Kaiqi, author.<br/>Preferred Shelf Number ONLINE(341979.1)<br/>Electronic Access MyiLibrary <a href="http://www.myilibrary.com?id=578586">http://www.myilibrary.com?id=578586</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118898598">http://dx.doi.org/10.1002/9781118898598</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:3419972024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security management a critical thinking approachent://SD_ILS/0/SD_ILS:3428452024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Preferred Shelf Number ONLINE(342845.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software test attacks to break mobile and embedded devicesent://SD_ILS/0/SD_ILS:3428682024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hagar, Jon Duncan, author.<br/>Preferred Shelf Number ONLINE(342868.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:3428862024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor DeFranco, Joanna F., author.<br/>Preferred Shelf Number ONLINE(342886.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical layer security in wireless communicationsent://SD_ILS/0/SD_ILS:3428872024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Zhou, Xiangyun Sean, editor. Song, Lingyang, editor. Zhang, Yan, 1977- editor.<br/>Preferred Shelf Number ONLINE(342887.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466567016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data analysis for network cyber-securityent://SD_ILS/0/SD_ILS:3547572024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systemsent://SD_ILS/0/SD_ILS:3553522024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Knapp, Eric D. Langill, Joel Thomas.<br/>Preferred Shelf Number ONLINE(355352.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The handbook for school safety and security : best practices and proceduresent://SD_ILS/0/SD_ILS:3555802024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fennelly, Lawrence J., 1940- editor. Perry, Marianna A., editor.<br/>Preferred Shelf Number ONLINE(355580.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005682">http://www.sciencedirect.com/science/book/9780128005682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Personnel protection : residential security, proven practicesent://SD_ILS/0/SD_ILS:3557162024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Miller, Jerome, author. Jones, Radford, author.<br/>Preferred Shelf Number ONLINE(355716.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009284">http://www.sciencedirect.com/science/book/9780128009284</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tourism security strategies for effectively managing travel risk and safetyent://SD_ILS/0/SD_ILS:3557362024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Tarlow, Peter E.<br/>Preferred Shelf Number ONLINE(355736.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124115705">http://www.sciencedirect.com/science/book/9780124115705</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:3557702024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:3558532024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:3563962024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number ONLINE(356396.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:3565162024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number ONLINE(356516.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:3565562024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number ONLINE(356556.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The frugal CISO : using innovation and smart approaches to maximize your security postureent://SD_ILS/0/SD_ILS:3566242024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Anderson, Kerry Ann, author.<br/>Preferred Shelf Number ONLINE(356624.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:3566572024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Peng, Kun, author.<br/>Preferred Shelf Number ONLINE(356657.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:3566812024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number ONLINE(356681.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data protection for photographers : a guide to storing and protecting your valuable digital assetsent://SD_ILS/0/SD_ILS:3642422024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Corrigan, Patrick H.<br/>Preferred Shelf Number TK7895.M4 C67 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:3419802024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy in smart gridsent://SD_ILS/0/SD_ILS:2863172024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Xiao, Yang, 1966-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439877845">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conflict and cooperation in cyberspace : the challenge to national securityent://SD_ILS/0/SD_ILS:2863322024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Yannakogeorgos, Panayotis A., editor. Lowther, Adam, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime security in Southeast Asiaent://SD_ILS/0/SD_ILS:2395772024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bradford, John F. National Bureau of Asian Research (U.S.) Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in cyber security technology, operations, and experiencesent://SD_ILS/0/SD_ILS:2395912024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CBRN and hazmat incidents at major public events : planning and responseent://SD_ILS/0/SD_ILS:2679622024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Kaszeta, Dan.<br/>Preferred Shelf Number WA 295 K1911 2013<br/>Format: Books<br/>Availability Health Sciences Library~1<br/>Introduction to securityent://SD_ILS/0/SD_ILS:2701302024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fischer, Robert J. Halibozek, Edward P. Walters, David, 1963-<br/>Preferred Shelf Number HV8290 G74 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:1456902024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:1459362024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Gantz, Stephen D. Philpott, Daniel R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:1469342024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Tam, Kenneth.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:3064602024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network attacks and defenses a hands-on approachent://SD_ILS/0/SD_ILS:2909242024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Trabelsi, Zouheir.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466517974">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:3442632024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cao, Zhenfu.<br/>Preferred Shelf Number ONLINE(344263.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied network security monitoring collection, detection, and analysisent://SD_ILS/0/SD_ILS:3561222024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Sanders, Chris. Smith, Jason.<br/>Preferred Shelf Number ONLINE(356122.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:2881552024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Supply chain security a comprehensive approachent://SD_ILS/0/SD_ILS:2881562024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Arway, Arthur G.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466511903">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:2881602024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Khoury, Franjieh El.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical infrastructure homeland security and emergency preparednessent://SD_ILS/0/SD_ILS:2881612024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Radvanovsky, Robert. McDougall, Allan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466503465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Williams, Barry L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Antiterrorism and threat response planning and implementationent://SD_ILS/0/SD_ILS:2909462024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Johnson, Ross.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466512917">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical infrastructure system security and resiliencyent://SD_ILS/0/SD_ILS:2917272024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Biringer, Betty E., 1952- Vugrin, Eric D. Warren, Drake E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466557512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:3066402024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Kotwica, Kathleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Aligning security services with business objectives proven practicesent://SD_ILS/0/SD_ILS:3066422024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Lefler, Richard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170087">http://www.sciencedirect.com/science/book/9780124170087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Corporate security organizational structure, cost of services and staffing benchmark research report / Bob Hayes, Greg Kane, Kathleen Kotwica.ent://SD_ILS/0/SD_ILS:3066472024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hayes, Bob E., 1963- Kane, Greg. Kotwica, Kathleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170025">http://www.sciencedirect.com/science/book/9780124170025</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information protection playbookent://SD_ILS/0/SD_ILS:3066492024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:3066912024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipesent://SD_ILS/0/SD_ILS:3130442024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fadyushin, Vyacheslav.<br/>Preferred Shelf Number ONLINE(313044.1)<br/>Electronic Access Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Structure preserving energy functions in power systems theory and applicationsent://SD_ILS/0/SD_ILS:2890672024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Padiyar, K. R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439879382">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:2906672024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Baker, Paul, 1958- Benny, Daniel J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing cloud and mobility a practitioner's guideent://SD_ILS/0/SD_ILS:3428392024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Lim, Ian. Hourani, Paul. Coolidge, E. Coleen.<br/>Preferred Shelf Number ONLINE(342839.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466550827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Strategic intelligence management : national security imperatives and information and communications technologiesent://SD_ILS/0/SD_ILS:2703632024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Akhgar, Babak. Yates, Simeon.<br/>Preferred Shelf Number TK5102.85 A44 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:2863072024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multimedia security watermarking, steganography, and forensicsent://SD_ILS/0/SD_ILS:2871512024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Shih, Frank Y.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439873328">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android security attacks and defensesent://SD_ILS/0/SD_ILS:2871932024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Misra, Anmol.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)[superscript 2] guide to the CAP CBKent://SD_ILS/0/SD_ILS:2880562024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>General aviation security aircraft, hangars, fixed-base operations, flight schools, and airportsent://SD_ILS/0/SD_ILS:2899582024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Benny, Daniel J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466510883">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing cloud and mobility a practitioner's guideent://SD_ILS/0/SD_ILS:2900012024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Lim, Ian. Hourani, Paul. Coolidge, E. Coleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439850572">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Combating climate change an agricultural perspectiveent://SD_ILS/0/SD_ILS:2853872024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Kang, Manjit S., editor of compilation. Banga, S. S. (Surinder S.), editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466566712">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2418372024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime private security market responses to piracy, terrorism and waterborne security risks in the 21st centuryent://SD_ILS/0/SD_ILS:2607192024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Berube, Claude G., 1966- Cullen, Patrick, 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203126608">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Competition and efficiency in international food supply chains improving food securityent://SD_ILS/0/SD_ILS:2608102024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Williams, John, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203122365">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime piracyent://SD_ILS/0/SD_ILS:2609022024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Haywood, Robert. Spivak, Roberta.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203144817">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The early years health and safety handbookent://SD_ILS/0/SD_ILS:2622762024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Parker, Lynn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203809662">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Justice and security in the 21st century risks, rights and the rule of lawent://SD_ILS/0/SD_ILS:2597352024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ugelvik, Synnøve, 1978- Hudson, Barbara, 1945-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203125588">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ending campus violence new approaches to preventionent://SD_ILS/0/SD_ILS:2599552024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Van Brunt, Brian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203149560">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:1460562024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:1481612024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of loss prevention and crime preventionent://SD_ILS/0/SD_ILS:1481752024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123852465">http://www.sciencedirect.com/science/book/9780123852465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISSP study guideent://SD_ILS/0/SD_ILS:1487692024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Risk analysis and the security surveyent://SD_ILS/0/SD_ILS:1490622024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Broder, James F. Tucker, Eugene.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123822338">http://www.sciencedirect.com/science/book/9780123822338</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook on securing cyber-physical critical infrastructureent://SD_ILS/0/SD_ILS:1455792024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:1462742024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The hacker's guide to OS X exploiting OS X from the root upent://SD_ILS/0/SD_ILS:1480062024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:1452542024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:1484292024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Chuvakin, Anton. Williams, Branden R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:1485162024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:1487312024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Oriyano, Sean-Philip. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing the insider threat no dark cornersent://SD_ILS/0/SD_ILS:2908132024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Catrantzos, Nick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439872932">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Operating systems demystifiedent://SD_ILS/0/SD_ILS:2941012024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Photonic sensing principles and applications for safety and security monitoringent://SD_ILS/0/SD_ILS:2993652024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Xiao, George. Bock, Wojtek J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118310205">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118310212">http://dx.doi.org/10.1002/9781118310212</a>
ebrary <a href="http://site.ebrary.com/id/10602117">http://site.ebrary.com/id/10602117</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=848527</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118310205">http://proquest.tech.safaribooksonline.de/9781118310205</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security aspects of uni-and multimodal hazmat transportation systemsent://SD_ILS/0/SD_ILS:3062652024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Reniers, Genserik L. L. Zamparini, Luca.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9783527664818">http://onlinelibrary.wiley.com/book/10.1002/9783527664818</a>
Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527664818">http://dx.doi.org/10.1002/9783527664818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computingent://SD_ILS/0/SD_ILS:2795142024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Weber, Stefan G. IOS Press.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RFID in libraries a step toward interoperabilityent://SD_ILS/0/SD_ILS:2810692024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ayre, Lori Bowen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=563865</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:2871022024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Masud, Mehedy. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart grid security an end-to-end view of security in the new electrical grident://SD_ILS/0/SD_ILS:2880302024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Sorebo, Gilbert. Echols, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439855898">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Motor fleet safety and security managementent://SD_ILS/0/SD_ILS:2900222024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Della-Giustina, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439895085">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ports in a storm : public management in a turbulent worldent://SD_ILS/0/SD_ILS:3764012024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Donahue, John D. Moore, Mark H., 1947-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.7864/j.ctt12636r">http://www.jstor.org/stable/10.7864/j.ctt12636r</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Against security : how we go wrong at airports, subways, and other sites of ambiguous dangerent://SD_ILS/0/SD_ILS:3767132024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Molotch, Harvey Luskin, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.cttq94nr">http://www.jstor.org/stable/10.2307/j.cttq94nr</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How Ottawa spends, 2012-2013 : the Harper majority, budget cuts, and the new oppositionent://SD_ILS/0/SD_ILS:3769632024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Doern, G. Bruce. Stoney, Christopher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt1pq1f8">http://www.jstor.org/stable/10.2307/j.ctt1pq1f8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2767002024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:2852492024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Paul, Goutam. Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:2889932024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ganguly, Debashis. Lahiri, Shibamouli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502451">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security governance simplified from the boardroom to the keyboardent://SD_ILS/0/SD_ILS:2906622024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fitzgerald, Todd.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439811658">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless network security a beginner's guideent://SD_ILS/0/SD_ILS:2932302024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Wrightson, Tyler.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/wireless-network-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security metrics a beginner's guideent://SD_ILS/0/SD_ILS:2932382024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the clicks network security in the age of social mediaent://SD_ILS/0/SD_ILS:2932402024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle WebLogic server 11g administration handbookent://SD_ILS/0/SD_ILS:2932432024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Alapati, Sam R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>iPhone geekery 50 insanely cool hacks and mods for your iPhone 4Sent://SD_ILS/0/SD_ILS:2934462024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/iphone-geekery-50-insanely-cool-hacks-mods-for-your-4s">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Robust control system networks how to achieve reliable control after Stuxnetent://SD_ILS/0/SD_ILS:2801812024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Langner, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:2862022024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Andreasson, Kim J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISO's guide to penetration testing a framework to plan, manage, and maximize benefitsent://SD_ILS/0/SD_ILS:2871052024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439880289">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Defense against the black arts how hackers do what they do and how to protect against itent://SD_ILS/0/SD_ILS:2915812024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Varsalone, Jesse. McFadden, Matthew. Morrissey, Sean.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:2915822024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439837221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:2700332024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Handbook of loss prevention and crime preventionent://SD_ILS/0/SD_ILS:2700432024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number HV8290 H345 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The death of the Internetent://SD_ILS/0/SD_ILS:2704362024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Jakobsson, Markus.<br/>Preferred Shelf Number TK5105.875.I57 D43 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:2861362024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Speed, Tyler Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:2861402024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Macaulay, Tyson. Singer, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439801987">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Our biometric future facial recognition technology and the culture of surveillanceent://SD_ILS/0/SD_ILS:2438222024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Gates, Kelly. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780814732793/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:2443122024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nuclear energy and global governance ensuring safety, security, and non-proliferationent://SD_ILS/0/SD_ILS:2625362024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Findlay, Trevor, 1951-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203834503">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The securitization of migration a study of movement and orderent://SD_ILS/0/SD_ILS:2653362024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Bourbeau, Philippe, 1972 Nov. 3-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203829349">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Terrorism and the Olympics major event security and lessons for the futureent://SD_ILS/0/SD_ILS:2653692024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Richards, Anthony. Fussey, Peter. Silke, Andrew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203835227">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Thor's Microsoft security bible a collection of practical security techniquesent://SD_ILS/0/SD_ILS:1468082024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Mullen, Timothy M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber warfare techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:1474792024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Andress, Jason. Winterfeld, Steve. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:1482252024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Faircloth, Jeremy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:1487852024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Andress, Jason. Linn, Ryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1489802024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the smart grid next generation power grid securityent://SD_ILS/0/SD_ILS:1491442024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Flick, Tony. Morehouse, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495707">http://www.sciencedirect.com/science/book/9781597495707</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:1491722024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Wheeler, Evan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Maritime security and the law of the seaent://SD_ILS/0/SD_ILS:2310062024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Klein, Natalie (Natalie S.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:1454572024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Knapp, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ninja hacking unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:1462632024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Wilhelm, Thomas. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Eleventh hour CISSP study guideent://SD_ILS/0/SD_ILS:1465972024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android forensics investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1452532024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hoog, Andrew. McCash, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:1456592024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective security managementent://SD_ILS/0/SD_ILS:1464712024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Sennewald, Charles A., 1931-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123820129">http://www.sciencedirect.com/science/book/9780123820129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Legal issues in information securityent://SD_ILS/0/SD_ILS:3654182024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Grama, Joanna Lyn, author.<br/>Preferred Shelf Number KF1263.C65 G73 2011<br/>Format: Books<br/>Availability Law Library~1<br/>Energy and security in South Asia : cooperation or conflict?ent://SD_ILS/0/SD_ILS:3757312024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ebinger, Charles K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.7864/j.ctt127x8w">http://www.jstor.org/stable/10.7864/j.ctt127x8w</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Essentials of online payment security and fraud preventionent://SD_ILS/0/SD_ILS:3040862024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Montague, David A., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118386750">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624574">http://swb.eblib.com/patron/FullRecord.aspx?p=624574</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Management strategies for the cloud revolution how cloud computing is transforming business and why you can't afford to be left behindent://SD_ILS/0/SD_ILS:2929692024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Babcock, Charles.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/management-strategies-for-cloud-revolution-how-computing-transforming-business-you-cant-afford-to-be-left-behind">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tips and traps for new home ownersent://SD_ILS/0/SD_ILS:2930222024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Irwin, Robert, 1941-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/tips-traps-for-new-home-owners">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Home networking demystified a self-teaching guideent://SD_ILS/0/SD_ILS:2941432024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Long, Larry E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Working positively with personality disorder in secure settings a practitioner's perspectiveent://SD_ILS/0/SD_ILS:2985792024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Willmot, Phil. Gordon, Neil, 1959- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9780470973110">An electronic book accessible through the World Wide Web; click for information</a>
Wiley InterScience - Full Text Online <a href="http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110">http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Next catastrophe : reducing our vulnerabilities to natural, industrial, and terrorist disastersent://SD_ILS/0/SD_ILS:3752872024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Perrow, Charles.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt7t4c1">http://www.jstor.org/stable/10.2307/j.ctt7t4c1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Proactive school security and emergency preparedness planningent://SD_ILS/0/SD_ILS:3691052024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Trump, Kenneth S.<br/>Preferred Shelf Number ONLINE(369105.1)<br/>Electronic Access SAGE knowledge <a href="http://sk.sagepub.com/books/proactive-school-security-and-emergency-preparedness-planning">http://sk.sagepub.com/books/proactive-school-security-and-emergency-preparedness-planning</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2711512024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Guide to security considerations and practices for rare book, manuscript, and special collection librariesent://SD_ILS/0/SD_ILS:2800942024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Wilkie, Everett C. Association of College and Research Libraries.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Staying safe at schoolent://SD_ILS/0/SD_ILS:2870842024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Quarles, Chester L. Quarles, Tammy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439858295">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:2884512024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and policy driven computingent://SD_ILS/0/SD_ILS:2888792024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Liu, Lei, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The security risk assessment handbook a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:2888902024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Landoll, Douglas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security of self-organizing networks MANET, WSN, WMN, VANETent://SD_ILS/0/SD_ILS:2907082024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439819203">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Risk and Safety Analysis of Nuclear Systemsent://SD_ILS/0/SD_ILS:2988912024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Lee, John C., 1941- author. McCormick, Norman J., 1938- author. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118043462">An electronic book accessible through the World Wide Web; click for information</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=325614&ref=toc">http://www.myilibrary.com?id=325614&ref=toc</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43276">http://www.books24x7.com/marc.asp?bookid=43276</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10494682">http://site.ebrary.com/lib/alltitles/Doc?id=10494682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and U.S. Foreign Policy : Iraq, 9/11, and Misguided Reform.ent://SD_ILS/0/SD_ILS:3757422024-11-03T00:44:40Z2024-11-03T00:44:40ZPreferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.7312/pill15792">http://www.jstor.org/stable/10.7312/pill15792</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3862412024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Kahate, Atul.<br/>Preferred Shelf Number TK5105.59 K12 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Guide to physical security planning & response for hospitals, medical, long term care facilitiesent://SD_ILS/0/SD_ILS:2786362024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Russell, Mary, 1953- Kendig, Jim. Philpott, Don, 1946-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure semantic service-oriented systemsent://SD_ILS/0/SD_ILS:2851052024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420073324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Honeypot a new paradigm to information securityent://SD_ILS/0/SD_ILS:2889612024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Joshi, R. C. Sardana, Anjali.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Casino security and gaming surveillanceent://SD_ILS/0/SD_ILS:2888952024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Boss, Derk J. Zajic, Alan W.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420087833">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing global transportation networks a total security management approachent://SD_ILS/0/SD_ILS:2931692024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Ritter, Luke. Barrett, J. Michael. Wilson, Rosalyn A. Ridge, Thomas J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-global-transportation-networks">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Architectural security codes and guidelines best practices for today's construction challengesent://SD_ILS/0/SD_ILS:2931732024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Wible, Robert C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/architectural-security-codes-guidelines">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Construction site securityent://SD_ILS/0/SD_ILS:2932032024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Arata, Michael J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/construction-site-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Property condition assessmentsent://SD_ILS/0/SD_ILS:2932062024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Kubba, Shamil A. A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/property-condition-assessments">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Perimeter securityent://SD_ILS/0/SD_ILS:2932132024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Arata, Michael J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/perimeter-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle Fusion middleware 11g architecture and managementent://SD_ILS/0/SD_ILS:2932522024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft SQL server 2008 R2 master data services implementation & administrationent://SD_ILS/0/SD_ILS:2932612024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Graham, Tyler. Selhorn, Suzanne.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-r2-master-data-services">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Master data management and data governanceent://SD_ILS/0/SD_ILS:2932672024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Berson, Alex. Dubov, Lawrence. Berson, Alex. Master data management and customer data integration for a global enterprise.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/master-data-management-governance-2e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>iPad & iPhone administrator's guide enterprise deployment strategies and security solutionsent://SD_ILS/0/SD_ILS:2932682024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/ipad-iphone-administrators-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed web applications web application security secrets and solutionsent://SD_ILS/0/SD_ILS:2932772024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security information and event management (SIEM) implementationent://SD_ILS/0/SD_ILS:2932792024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:2932892024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mac OS X system administrationent://SD_ILS/0/SD_ILS:2932982024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed wireless wireless security secrets & solutionsent://SD_ILS/0/SD_ILS:2933002024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless network administration a beginner's guideent://SD_ILS/0/SD_ILS:2933052024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Soyinka, Wale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/wireless-network-administration-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile application securityent://SD_ILS/0/SD_ILS:2933122024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Networking a beginner's guideent://SD_ILS/0/SD_ILS:2933142024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle WebCenter 11g handbook build rich, customizable enterprise 2.0 applicationsent://SD_ILS/0/SD_ILS:2933162024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Desbiens, Fr�ed�eric. Moskovits, Peter. Weckerle, Philipp.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-webcenter-11g-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>24 deadly sins of software security programming flaws and how to fix thement://SD_ILS/0/SD_ILS:2933192024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco ASA configurationent://SD_ILS/0/SD_ILS:2933222024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Deal, Richard A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed Linux Linux security secrets and solutions.ent://SD_ILS/0/SD_ILS:2933242024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Fedora 7 & Red Hat Enterprise Linux the complete referenceent://SD_ILS/0/SD_ILS:2933282024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Petersen, Richard, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ajax the complete referenceent://SD_ILS/0/SD_ILS:2933442024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Powell, Thomas A., 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/ajax-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed Web 2.0 Web 2.0 security secrets and solutionsent://SD_ILS/0/SD_ILS:2933522024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle Enterprise manager 10g grid control implementation guideent://SD_ILS/0/SD_ILS:2933552024-11-03T00:44:40Z2024-11-03T00:44:40ZAuthor New, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-enterprise-manager-10g-grid-control-implementation-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>