Search Results for Security Measures. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300? 2026-04-22T09:55:42Z Optimum spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:574605 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003497523">https://www.taylorfrancis.com/books/9781003497523</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : third party risk management ent://SD_ILS/0/SD_ILS:584312 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587576">https://www.taylorfrancis.com/books/9781003587576</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : digital privacy and data protection ent://SD_ILS/0/SD_ILS:572623 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003507109">https://www.taylorfrancis.com/books/9781003507109</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : AI and governance ent://SD_ILS/0/SD_ILS:584311 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2025 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587569">https://www.taylorfrancis.com/books/9781003587569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605581 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8540-7">https://doi.org/10.1007/978-981-97-8540-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605582 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8546-9">https://doi.org/10.1007/978-981-97-8546-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605670 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75757-0">https://doi.org/10.1007/978-3-031-75757-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605671 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75764-8">https://doi.org/10.1007/978-3-031-75764-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks and Big Data 10th International Symposium, SocialSec 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607720 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861&#160;Aldwairi, Monther. editor. (orcid)0000-0003-1150-2404&#160;Raymond Choo, Kim-Kwang. editor. (orcid)0000-0001-9208-5336&#160;Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345&#160;Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3774-4">https://doi.org/10.1007/978-981-96-3774-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bring Your Own Device Security Policy Compliance Framework ent://SD_ILS/0/SD_ILS:607863 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Palanisamy, Rathika. author. (orcid)0000-0001-6495-1081&#160;Norman, Azah Anir. author.&#160;Kiah, Miss Laiha Mat. author.&#160;Herawan, Tutut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86801-6">https://doi.org/10.1007/978-3-031-86801-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607910 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Xiang, Yang. editor. (orcid)0000-0001-5252-0831&#160;Shen, Jian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4566-4">https://doi.org/10.1007/978-981-96-4566-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:608364 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Lin, Dongdai. editor.&#160;Wang, Meiqin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4734-7">https://doi.org/10.1007/978-981-96-4734-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609259 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609291 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:609486 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Morogan, Luciana. editor. (orcid)0000-0002-3119-152X&#160;Roenne, Peter. editor. (orcid)0000-0002-2785-8301&#160;Bica, Ion. editor. (orcid)0000-0002-0890-4376&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-87760-5">https://doi.org/10.1007/978-3-031-87760-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Systems and Security Proceedings of ICISS 2024 ent://SD_ILS/0/SD_ILS:609937 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Giri, Debasis. editor.&#160;Ho, Anthony T. S. editor.&#160;Ochiai, Hideki. editor.&#160;Mandal, Mrinal. editor.&#160;Sinha, Koushik. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4273-1">https://doi.org/10.1007/978-981-96-4273-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing a Connected Future IoT Cybersecurity &amp; IP Security for Makers and Users of Medical Technology ent://SD_ILS/0/SD_ILS:610416 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Harding, William. author.&#160;Hartmann, Andreas. author.&#160;O'Brien, Shayla. author.&#160;Sinzig, Viktor. author.&#160;Break, Gabriel. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-07309-9">https://doi.org/10.1007/978-3-032-07309-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605357 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8016-7">https://doi.org/10.1007/978-981-97-8016-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605415 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8013-6">https://doi.org/10.1007/978-981-97-8013-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605517 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64954-7">https://doi.org/10.1007/978-3-031-64954-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Environments ent://SD_ILS/0/SD_ILS:605758 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Pitropakis, Nikolaos. editor. (orcid)0000-0002-3392-9970&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-66708-4">https://doi.org/10.1007/978-3-031-66708-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606243 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78017-2">https://doi.org/10.1007/978-3-031-78017-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part IX ent://SD_ILS/0/SD_ILS:606427 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0947-5">https://doi.org/10.1007/978-981-96-0947-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606319 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78011-0">https://doi.org/10.1007/978-3-031-78011-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VIII ent://SD_ILS/0/SD_ILS:608268 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91101-9">https://doi.org/10.1007/978-3-031-91101-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:608269 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91131-6">https://doi.org/10.1007/978-3-031-91131-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:608363 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Lin, Dongdai. editor.&#160;Wang, Meiqin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4731-6">https://doi.org/10.1007/978-981-96-4731-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:601805 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64948-6">https://doi.org/10.1007/978-3-031-64948-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:606350 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78023-3">https://doi.org/10.1007/978-3-031-78023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606283 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78020-2">https://doi.org/10.1007/978-3-031-78020-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606449 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0888-1">https://doi.org/10.1007/978-981-96-0888-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606436 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0875-1">https://doi.org/10.1007/978-981-96-0875-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part V ent://SD_ILS/0/SD_ILS:606437 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0935-2">https://doi.org/10.1007/978-981-96-0935-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:606438 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0941-3">https://doi.org/10.1007/978-981-96-0941-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:606462 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0938-3">https://doi.org/10.1007/978-981-96-0938-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part VIII ent://SD_ILS/0/SD_ILS:606463 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0944-4">https://doi.org/10.1007/978-981-96-0944-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606477 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0891-1">https://doi.org/10.1007/978-981-96-0891-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part IV ent://SD_ILS/0/SD_ILS:606498 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0894-2">https://doi.org/10.1007/978-981-96-0894-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606946 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Li, Wenjuan. editor. (orcid)0000-0003-3745-5669&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Lopez, Javier. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80419-9">https://doi.org/10.1007/978-3-031-80419-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings ent://SD_ILS/0/SD_ILS:607075 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Horn Iwaya, Leonardo. editor. (orcid)0000-0001-9005-0543&#160;Kamm, Liina. editor. (orcid)0000-0003-1479-2195&#160;Martucci, Leonardo. editor. (orcid)0000-0002-9980-3473&#160;Pulls, Tobias. editor. (orcid)0000-0001-6459-8409&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-79007-2">https://doi.org/10.1007/978-3-031-79007-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:607144 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Lee, Jong-Hyouk. editor. (orcid)0000-0002-1753-1284&#160;Emura, Keita. editor. (orcid)0000-0002-8969-3581&#160;Lee, Sokjoon. editor. (orcid)0000-0002-4632-8322&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-1624-4">https://doi.org/10.1007/978-981-96-1624-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 19th International Conference, CRITIS 2024, Rome, Italy, September 18-20, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:607516 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Oliva, Gabriele. editor. (orcid)0000-0001-7257-4079&#160;Panzieri, Stefano. editor. (orcid)0000-0002-6042-5479&#160;H&auml;mmerli, Bernhard. editor. (orcid)0000-0001-6251-1154&#160;Pascucci, Federica. editor. (orcid)0000-0002-8226-0716&#160;Faramondi, Luca. editor. (orcid)0000-0002-3750-2405<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-84260-3">https://doi.org/10.1007/978-3-031-84260-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the Connected World Exploring Emerging Threats and Innovative Solutions ent://SD_ILS/0/SD_ILS:608011 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Thampi, Sabu M. editor. (orcid)0000-0001-6453-5520&#160;Thomas, Tony. editor. (orcid)0000-0002-9323-6607&#160;Mukherjee, Preetam. editor. (orcid)0000-0003-2549-6578&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82826-3">https://doi.org/10.1007/978-3-031-82826-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608245 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91124-8">https://doi.org/10.1007/978-3-031-91124-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:608246 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91134-7">https://doi.org/10.1007/978-3-031-91134-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part V ent://SD_ILS/0/SD_ILS:608267 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91092-0">https://doi.org/10.1007/978-3-031-91092-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings ent://SD_ILS/0/SD_ILS:608577 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Mesnager, Sihem. editor. (orcid)0000-0003-4008-2031&#160;St&#259;nic&#259;, Pantelimon. editor. (orcid)0000-0002-8622-7120&#160;Debnath, Sumit Kumar. editor. (orcid)0000-0001-6374-1410&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90587-2">https://doi.org/10.1007/978-3-031-90587-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Security Proceedings of IDSCS 2024, Volume 2 ent://SD_ILS/0/SD_ILS:609195 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Shukla, Samiksha. editor. (orcid)0000-0003-2690-8175&#160;Sayama, Hiroki. editor. (orcid)0000-0002-2670-5864&#160;Tiwari, Kapil. editor.&#160;Kureethara, Joseph Varghese. editor. (orcid)0000-0001-5030-3948&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4883-2">https://doi.org/10.1007/978-981-96-4883-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609277 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Demystifying AI and ML for Cyber-Threat Intelligence ent://SD_ILS/0/SD_ILS:609747 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Yang, Ming. editor.&#160;Mohanty, Sachi Nandan. editor.&#160;Satpathy, Suneeta. editor.&#160;Hu, Shu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90723-4">https://doi.org/10.1007/978-3-031-90723-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2024, Volume 3 ent://SD_ILS/0/SD_ILS:609850 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Ill&eacute;s, Zolt&aacute;n. editor.&#160;Verma, Chaman. editor. (orcid)0000-0002-9925-112X&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Singh, Yashwant. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6034-6">https://doi.org/10.1007/978-981-96-6034-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Security Proceedings of IDSCS 2024, Volume 1 ent://SD_ILS/0/SD_ILS:609818 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Shukla, Samiksha. editor. (orcid)0000-0003-2690-8175&#160;Sayama, Hiroki. editor. (orcid)0000-0002-2670-5864&#160;Tiwari, Kapil. editor.&#160;Kureethara, Joseph Varghese. editor. (orcid)0000-0001-5030-3948&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4880-1">https://doi.org/10.1007/978-981-96-4880-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607656 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Song, Houbing Herbert. editor. (orcid)0000-0003-2631-9223&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X&#160;Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345&#160;Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3531-3">https://doi.org/10.1007/978-981-96-3531-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research 9th International Conference, SSR 2024, Kunming, China, December 16, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607991 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Lu, Xianhui. editor. (orcid)0000-0001-7091-5810&#160;Mitchell, Chris J. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-87541-0">https://doi.org/10.1007/978-3-031-87541-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:608242 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91095-1">https://doi.org/10.1007/978-3-031-91095-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:608243 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91098-2">https://doi.org/10.1007/978-3-031-91098-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques Madrid, Spain, May 4-8, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:608244 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fehr, Serge. editor.&#160;Fouque, Pierre-Alain. editor. (orcid)0000-0003-4997-2276&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91107-1">https://doi.org/10.1007/978-3-031-91107-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence technology in healthcare : security and privacy issues ent://SD_ILS/0/SD_ILS:574411 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Sharma, Neha (Computer scientist), editor.&#160;Srivastava, Durgesh (Computer scientist), editor.&#160;Sinwar, Deepak, editor.<br/>Preferred Shelf Number&#160;R859.7 .A78<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:586024 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404354">https://www.taylorfrancis.com/books/9781003404354</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why CISOs fail ent://SD_ILS/0/SD_ILS:577207 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Engel, Barak, author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003302759">https://www.taylorfrancis.com/books/9781003302759</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:603382 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58716-0">https://doi.org/10.1007/978-3-031-58716-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:603383 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58737-5">https://doi.org/10.1007/978-3-031-58737-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V ent://SD_ILS/0/SD_ILS:603384 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58740-5">https://doi.org/10.1007/978-3-031-58740-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:603385 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58751-1">https://doi.org/10.1007/978-3-031-58751-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:603386 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58754-2">https://doi.org/10.1007/978-3-031-58754-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:603492 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58723-8">https://doi.org/10.1007/978-3-031-58723-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:603434 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58734-4">https://doi.org/10.1007/978-3-031-58734-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware Detection and Adversarial Methods ent://SD_ILS/0/SD_ILS:603645 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Niu, Weina. author.&#160;Zhang, Xiaosong. author.&#160;Yan, Ran. author.&#160;Gong, Jiacheng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-1459-9">https://doi.org/10.1007/978-981-97-1459-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Science and Security Proceedings of IDSCS 2023 ent://SD_ILS/0/SD_ILS:603729 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Shukla, Samiksha. editor. (orcid)0000-0003-2690-8175&#160;Sayama, Hiroki. editor. (orcid)0000-0002-2670-5864&#160;Kureethara, Joseph Varghese. editor. (orcid)0000-0001-5030-3948&#160;Mishra, Durgesh Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0975-5">https://doi.org/10.1007/978-981-97-0975-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604032 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61486-6">https://doi.org/10.1007/978-3-031-61486-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Execution Environments ent://SD_ILS/0/SD_ILS:604058 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Shepherd, Carlton. author.&#160;Markantonakis, Konstantinos. author. (orcid)0000-0003-3975-9033&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55561-9">https://doi.org/10.1007/978-3-031-55561-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 18th International Conference, CRITIS 2023, Helsinki Region, Finland, September 13-15, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:604072 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Pickl, Stefan. editor. (orcid)0000-0001-5549-6259&#160;H&auml;mmerli, Bernhard. editor. (orcid)0000-0001-6251-1154&#160;Mattila, P&auml;ivi. editor. (orcid)0000-0002-1683-2392&#160;Sevillano, Annaleena. editor. (orcid)0000-0002-8204-1791&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62139-0">https://doi.org/10.1007/978-3-031-62139-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604086 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61489-7">https://doi.org/10.1007/978-3-031-61489-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Tenth International Conference on Mathematics and Computing ICMC 2024, Volume 1 ent://SD_ILS/0/SD_ILS:604175 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Giri, Debasis. editor.&#160;Vaidya, Jaideep. editor.&#160;Ponnusamy, S. editor. (orcid)0000-0002-3699-2713&#160;Lin, Zhiqiang. editor.&#160;Joshi, Karuna Pande. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2066-8">https://doi.org/10.1007/978-981-97-2066-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Tenth International Conference on Mathematics and Computing ICMC 2024, Volume 2 ent://SD_ILS/0/SD_ILS:604176 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Giri, Debasis. editor.&#160;Vaidya, Jaideep. editor.&#160;Ponnusamy, S. editor. (orcid)0000-0002-3699-2713&#160;Lin, Zhiqiang. editor.&#160;Joshi, Karuna Pande. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2069-9">https://doi.org/10.1007/978-981-97-2069-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the Future Introduction to Zero Trust in Cybersecurity ent://SD_ILS/0/SD_ILS:604187 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;H L, Gururaj. author.&#160;M, Spoorthi. author.&#160;Ravi, Vinayakumar. author. (orcid)0000-0001-6873-6469&#160;J, Shreyas. author. (orcid)0000-0002-3427-4486&#160;Roy, Kumar Sekhar. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-63781-0">https://doi.org/10.1007/978-3-031-63781-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology - AFRICACRYPT 2024 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings ent://SD_ILS/0/SD_ILS:604188 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Vaudenay, Serge. editor. (orcid)0000-0001-9185-1449&#160;Petit, Christophe. editor. (orcid)0000-0003-3482-6743&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64381-1">https://doi.org/10.1007/978-3-031-64381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2023, Volume 1 ent://SD_ILS/0/SD_ILS:604279 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Singh, Yashwant. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Kar, Arpan Kumar. editor. (orcid)0000-0003-4186-4887&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2839-8">https://doi.org/10.1007/978-981-97-2839-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Systems 19th EAI International Conference, QShine 2023, Shenzhen, China, October 8 - 9, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604755 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Leung, Victor C.M. editor.&#160;Li, Hezhang. editor.&#160;Hu, Xiping. editor.&#160;Ning, Zhaolong. editor. (orcid)0000-0002-7870-5524&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65123-6">https://doi.org/10.1007/978-3-031-65123-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Systems 19th EAI International Conference, QShine 2023, Shenzhen, China, October 8 - 9, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604756 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Leung, Victor C.M. editor.&#160;Li, Hezhang. editor.&#160;Hu, Xiping. editor.&#160;Ning, Zhaolong. editor. (orcid)0000-0002-7870-5524&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65126-7">https://doi.org/10.1007/978-3-031-65126-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605041 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70890-9">https://doi.org/10.1007/978-3-031-70890-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2023, Volume 2 ent://SD_ILS/0/SD_ILS:605674 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Ill&eacute;s, Zolt&aacute;n. editor.&#160;Verma, Chaman. editor. (orcid)0000-0002-9925-112X&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-3442-9">https://doi.org/10.1007/978-981-97-3442-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602342 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kim, Howon. editor.&#160;Youn, Jonghee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-8024-6">https://doi.org/10.1007/978-981-99-8024-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602345 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50594-2">https://doi.org/10.1007/978-3-031-50594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:602346 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51479-1">https://doi.org/10.1007/978-3-031-51479-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:605042 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70903-6">https://doi.org/10.1007/978-3-031-70903-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605040 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70879-4">https://doi.org/10.1007/978-3-031-70879-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2023, Volume 3 ent://SD_ILS/0/SD_ILS:606246 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Singh, Yashwant. editor.&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.&#160;Singh, Pradeep Kumar. editor. (orcid)0000-0002-7676-9014&#160;Kolekar, Maheshkumar H. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-7862-1">https://doi.org/10.1007/978-981-97-7862-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings ent://SD_ILS/0/SD_ILS:601940 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fritsch, Lothar. editor.&#160;Hassan, Ismail. editor.&#160;Paintsil, Ebenezer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47748-5">https://doi.org/10.1007/978-3-031-47748-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 6th International Conference, FCS 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602287 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Yang, Haomiao. editor.&#160;Lu, Rongxing. editor. (orcid)0000-0001-5720-0941&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9331-4">https://doi.org/10.1007/978-981-99-9331-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602288 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Shao, Jun. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9614-8">https://doi.org/10.1007/978-981-99-9614-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602337 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51476-0">https://doi.org/10.1007/978-3-031-51476-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:602338 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Tsudik, Gene. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Liang, Kaitai. editor.&#160;Smaragdakis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51482-1">https://doi.org/10.1007/978-3-031-51482-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602386 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Manulis, Mark. editor. (orcid)0000-0002-1512-9670&#160;Maimu&#355;, Diana. editor.&#160;Te&#351;eleanu, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-52947-4">https://doi.org/10.1007/978-3-031-52947-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Watermarking Latest Developments and Trends ent://SD_ILS/0/SD_ILS:602650 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kumar Sahu, Aditya. editor. (orcid)0000-0003-4257-0688&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9803-6">https://doi.org/10.1007/978-981-99-9803-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602673 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0945-8">https://doi.org/10.1007/978-981-97-0945-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602684 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0942-7">https://doi.org/10.1007/978-981-97-0942-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602750 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor. (orcid)0000-0001-8792-0413&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54204-6">https://doi.org/10.1007/978-3-031-54204-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchains A Handbook on Fundamentals, Platforms and Applications ent://SD_ILS/0/SD_ILS:602803 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Ruj, Sushmita. editor.&#160;Kanhere, Salil S. editor.&#160;Conti, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602834 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Abie, Habtamu. editor. (orcid)0000-0003-0866-5050&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Verderame, Luca. editor. (orcid)0000-0001-7155-7429&#160;Cambiaso, Enrico. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54129-2">https://doi.org/10.1007/978-3-031-54129-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience Fundamentals ent://SD_ILS/0/SD_ILS:602876 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Tjoa, Simon. author.&#160;Gafi&#263;, Melisa. author.&#160;Kieseberg, Peter. author. (orcid)0000-0002-2847-2152&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-52064-8">https://doi.org/10.1007/978-3-031-52064-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data-Centric Security in Software Defined Networks (SDN) ent://SD_ILS/0/SD_ILS:603213 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Amanowicz, Marek. author.&#160;Szwaczyk, Sebastian. author. (orcid)0000-0002-3657-4685&#160;Wrona, Konrad. author. (orcid)0000-0002-3362-9820&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55517-6">https://doi.org/10.1007/978-3-031-55517-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings ent://SD_ILS/0/SD_ILS:603309 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kim, Dan Dongseong. editor. (orcid)0000-0003-2605-187X&#160;Chen, Chao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2458-1">https://doi.org/10.1007/978-981-97-2458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safe, Secure, Ethical, Responsible Technologies and Emerging Applications First EAI International Conference, SAFER-TEA 2023, Yaound&eacute;, Cameroon, October 25-27, 2023, Proceedings ent://SD_ILS/0/SD_ILS:603424 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Tchakounte, Franklin. editor.&#160;Atemkeng, Marcellin. editor.&#160;Rajagopalan, Rajeswari Pillai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-56396-6">https://doi.org/10.1007/978-3-031-56396-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 - March 1, 2024, Proceedings ent://SD_ILS/0/SD_ILS:603949 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Bouzefrane, Samia. editor. (orcid)0000-0002-0979-1289&#160;Sauveron, Damien. editor. (orcid)0000-0001-7948-6143&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-60391-4">https://doi.org/10.1007/978-3-031-60391-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2024 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:605052 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Chora&#347;, Micha&#322;. editor. (orcid)0000-0003-1405-9911&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-70896-1">https://doi.org/10.1007/978-3-031-70896-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605093 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Galdi, Clemente. editor. (orcid)0000-0002-2988-700X&#160;Phan, Duong Hieu. editor. (orcid)0000-0003-1136-4064&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71070-4">https://doi.org/10.1007/978-3-031-71070-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605094 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Galdi, Clemente. editor. (orcid)0000-0002-2988-700X&#160;Phan, Duong Hieu. editor. (orcid)0000-0003-1136-4064&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71073-5">https://doi.org/10.1007/978-3-031-71073-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606703 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chen, Biwen. editor. (orcid)0000-0002-7314-8271&#160;Fu, Xinwen. editor. (orcid)0000-0003-2391-7789&#160;Huang, Min. editor. (orcid)0000-0003-2744-0455&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0151-6">https://doi.org/10.1007/978-981-96-0151-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606704 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Chen, Biwen. editor. (orcid)0000-0002-7314-8271&#160;Fu, Xinwen. editor. (orcid)0000-0003-2391-7789&#160;Huang, Min. editor. (orcid)0000-0003-2744-0455&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0154-7">https://doi.org/10.1007/978-981-96-0154-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing and Applications Proceedings of ICDIC 2020 ent://SD_ILS/0/SD_ILS:528678 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Rao, B. Narendra Kumar. editor.&#160;Balasubramanian, R. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Nayak, Richi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1 ent://SD_ILS/0/SD_ILS:529010 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Singh, Yashwant. editor.&#160;Singh, Pradeep Kumar. editor.&#160;Kolekar, Maheshkumar H. editor.&#160;Kar, Arpan Kumar. editor.&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2023 ent://SD_ILS/0/SD_ILS:529021 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Ranganathan, G. editor.&#160;EL Allioui, Youssouf. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Symposium 2023 Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) ent://SD_ILS/0/SD_ILS:529055 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Schiffner, Stefan. editor.&#160;Ziegler, S&eacute;bastien. editor. (orcid)0000-0001-7255-4975&#160;Jensen, Meiko. editor. (orcid)0009-0003-2397-9813&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-44939-0">https://doi.org/10.1007/978-3-031-44939-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2022 ent://SD_ILS/0/SD_ILS:526883 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Ranganathan, G. editor.&#160;Fernando, Xavier. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-3590-9">https://doi.org/10.1007/978-981-19-3590-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and Identity Access Management ent://SD_ILS/0/SD_ILS:527374 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Rawal, Bharat S. author.&#160;Manogaran, Gunasekaran. author.&#160;Peter, Alexender. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023 ent://SD_ILS/0/SD_ILS:528415 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Giri, Debasis. editor.&#160;Gollmann, Dieter. editor.&#160;Ponnusamy, S. editor.&#160;Kouichi, Sakurai. editor.&#160;Stanimirovi&#263;, Predrag S. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Trust and Privacy Models, and Architectures in IoT Environments ent://SD_ILS/0/SD_ILS:526748 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Fotia, Lidia. editor.&#160;Messina, Fabrizio. editor.&#160;Rosaci, Domenico. editor.&#160;Sarn&eacute;, Giuseppe M.L. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-21940-5">https://doi.org/10.1007/978-3-031-21940-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software security : concepts &amp; practices ent://SD_ILS/0/SD_ILS:570473 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Khan, Suhel Ahmad, author.&#160;Kumar, Rajeev, author.&#160;Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number&#160;QA76.76 .D47<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in practice : establish and operationalize a holistic data privacy program ent://SD_ILS/0/SD_ILS:560699 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Tang, Alan, (Information Security), author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225089">https://www.taylorfrancis.com/books/9781003225089</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy in the Internet of things : architectures, techniques, and applications ent://SD_ILS/0/SD_ILS:597184 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Awad, Ali Ismail, editor.&#160;Abawajy, Jemal H., 1982- editor.<br/>Preferred Shelf Number&#160;TK5105.8857 .S444 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Security Hippie. ent://SD_ILS/0/SD_ILS:587563 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Engel, Barak.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimal spending on cybersecurity measures : risk management ent://SD_ILS/0/SD_ILS:553885 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kissoon, Tara, author.<br/>Preferred Shelf Number&#160;HF5548.37 .K57 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Executive's guide to cyber risk : securing the future today ent://SD_ILS/0/SD_ILS:597567 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Moyo, Siegfried, author.<br/>Preferred Shelf Number&#160;HF5548.37 .M68 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:549829 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2021 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090441">https://www.taylorfrancis.com/books/9781003090441</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud computing security foundations and challenges ent://SD_ILS/0/SD_ILS:580601 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;QA76.585<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, regulations, and cybersecurity : the essential business guide ent://SD_ILS/0/SD_ILS:596472 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD61.5 .M675 2021 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and its challenges in the 21st Century ent://SD_ILS/0/SD_ILS:597077 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Guerrier, Claudine, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud security : concepts, applications and perspectives ent://SD_ILS/0/SD_ILS:590261 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Gupta, Brij, 1982- editor.<br/>Preferred Shelf Number&#160;TK5105.59 .C576 2021 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367821555">https://www.taylorfrancis.com/books/9780367821555</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions ent://SD_ILS/0/SD_ILS:596265 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Moore, Richard O., III, 1971- author.<br/>Preferred Shelf Number&#160;HD61.5 .M66 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection ensuring data availability ent://SD_ILS/0/SD_ILS:582517 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;De Guise, Preston.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367463496">https://www.taylorfrancis.com/books/9780367463496</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global cyber security labor shortage and international business risk ent://SD_ILS/0/SD_ILS:481810 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Christiansen, Bryan, 1960- editor.&#160;Piekarz, Agnieszka, 1990- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers : cybersecurity advice from the best hackers in the world ent://SD_ILS/0/SD_ILS:595418 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643395</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:593721 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Song, Houbing, editor.&#160;Fink, Glenn A., editor.&#160;Jeschke, Sabina, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .S43923 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119226079</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SECURITY STRATEGY : from requirements to reality. ent://SD_ILS/0/SD_ILS:545098 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;STACKPOLE, BILL.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts ent://SD_ILS/0/SD_ILS:613224 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Martellini, Maurizio. editor.&#160;Malizia, Andrea. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-62108-1">https://doi.org/10.1007/978-3-319-62108-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure ICT Service Provisioning for Cloud, Mobile and Beyond ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providers ent://SD_ILS/0/SD_ILS:613582 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;von Faber, Eberhard. author.&#160;Behnsen, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-16482-9">https://doi.org/10.1007/978-3-658-16482-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:615982 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Lopez, Javier. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64483-7">https://doi.org/10.1007/978-3-319-64483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618120 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61437-3">https://doi.org/10.1007/978-3-319-61437-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Raggo, Michael T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611128 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Gabillon, Alban. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611037 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Mauw, Sjouke. editor.&#160;Kordy, Barbara. editor.&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Sensor Networks Security, Coverage, and Localization ent://SD_ILS/0/SD_ILS:611390 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Selmic, Rastko R. author.&#160;Phoha, Vir V. author.&#160;Serwadda, Abdul. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Total information risk management maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:306693 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Borek, Alexander.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection for photographers : a guide to storing and protecting your valuable digital assets ent://SD_ILS/0/SD_ILS:364242 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Corrigan, Patrick H.<br/>Preferred Shelf Number&#160;TK7895.M4 C67 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:543619 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;TK5105.59 .P463 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881606">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:306649 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kane, Greg, editor of compilation.&#160;Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Responsive Security ent://SD_ILS/0/SD_ILS:542438 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kang, Meng-Chow, author.<br/>Preferred Shelf Number&#160;HF5548.37<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781315145907">https://www.taylorfrancis.com/books/9781315145907</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;HD30.38 .B76 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:545128 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Williams, Barry L., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 .W5495 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466580596">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The death of the Internet ent://SD_ILS/0/SD_ILS:270436 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Jakobsson, Markus.<br/>Preferred Shelf Number&#160;TK5105.875.I57 D43 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:299263 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Halpert, Ben, 1986-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:539743 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:541595 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Scherling, Mark., author.<br/>Preferred Shelf Number&#160;HF5548.37 .S34 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Tibble, Ian., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:539948 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Trinckes, John J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T75 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information warfare ent://SD_ILS/0/SD_ILS:304069 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Ventre, Daniel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a> <a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a> OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security governance a practical development and implementation approach ent://SD_ILS/0/SD_ILS:297743 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:546952 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Brotby, W. Krag., author.<br/>Preferred Shelf Number&#160;HD30.2 .B78 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:544153 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Collette, Ronald D., author.&#160;Gentile, Michael.&#160;Gentile, Skye.<br/>Preferred Shelf Number&#160;HF5548.37 .G462 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420089110">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H52 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:539830 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Willett, Keith D., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 W5487 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780849380686">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Multimedia content encryption : techniques and applications ent://SD_ILS/0/SD_ILS:539955 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Lian, Shiguo., author.<br/>Preferred Shelf Number&#160;QA76.575 .L52 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420065282">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:146277 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kanclirz, Jan.&#160;Baskin, Brian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Clark, Champ, III.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security : design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:545839 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Layton, Timothy P., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L393 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The CISO handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:539204 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Gentile, Michael., author.&#160;Collette, Ronald D.&#160;August, Thomas D.<br/>Preferred Shelf Number&#160;HF5548.37 .G46 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031379">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:545167 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Landoll, Douglas J., author.<br/>Preferred Shelf Number&#160;HF5548.37 .L358 2006<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031232">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:254017 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction : a handbook for the 21st century ent://SD_ILS/0/SD_ILS:593044 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-<br/>Preferred Shelf Number&#160;QA76.9 .A25 B79 2005<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a> <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:545277 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Kairab, Sudhanshu., author.<br/>Preferred Shelf Number&#160;HF5548.32 .K345 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:544973 2026-04-22T09:55:42Z 2026-04-22T09:55:42Z Author&#160;Herrmann, Debra S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H47 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>