Search Results for Security Systems. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bSystems.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2024-11-15T04:30:39Z
Security for Cloud Storage Systems
ent://SD_ILS/0/SD_ILS:487858
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Yang, Kan. author. Jia, Xiaohua. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:288155
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy and Trust in Cloud Systems
ent://SD_ILS/0/SD_ILS:487946
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Nepal, Surya. editor. Pathan, Mukaddim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485997
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Dhillon, Gurpreet. editor. Karlsson, Fredrik. editor. Hedström, Karin. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483024
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Hamid, Brahim. editor. Gallina, Barbara. editor. (orcid)0000-0002-6952-1053 Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059 Elovici, Yuval. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483447
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Mori, Paolo. editor. (orcid)0000-0002-6618-0388 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Quality in Cyber-Physical Systems Engineering With Forewords by Robert M. Lee and Tom Gilb
ent://SD_ILS/0/SD_ILS:485380
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Biffl, Stefan. editor. (orcid)0000-0002-3413-7780 Eckhart, Matthias. editor. Lüder, Arndt. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25312-7">https://doi.org/10.1007/978-3-030-25312-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday
ent://SD_ILS/0/SD_ILS:486859
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Alvim, Mário S. editor. Chatzikokolakis, Kostas. editor. Olarte, Carlos. editor. Valencia, Frank. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications
ent://SD_ILS/0/SD_ILS:400016
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Rao, Nageswara S.V. editor. Brooks, Richard R. editor. Wu, Chase Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400045
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X Kutyłowski, Mirosław. editor. (orcid)0000-0003-3192-2430 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Computing and Systems for Security Volume Six
ent://SD_ILS/0/SD_ILS:400080
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Chaki, Rituparna. editor. Cortesi, Agostino. editor. Saeed, Khalid. editor. Chaki, Nabendu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017
ent://SD_ILS/0/SD_ILS:400671
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Yang, Xin-She. editor. Nagar, Atulya K. editor. Joshi, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401734
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. Zhou, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:399121
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Ganapathi, Geetha. editor. Subramaniam, Arumugam. editor. Graña, Manuel. editor. Balusamy, Suresh. editor. Natarajan, Rajamanickam. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Computing and Systems for Security Volume Five
ent://SD_ILS/0/SD_ILS:401086
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Chaki, Rituparna. editor. Cortesi, Agostino. editor. Saeed, Khalid. editor. Chaki, Nabendu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401486
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Mori, Paolo. editor. Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems
ent://SD_ILS/0/SD_ILS:355352
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Knapp, Eric D. Langill, Joel Thomas.<br/>Preferred Shelf Number ONLINE(355352.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485732
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Felber, Pascal. editor. Garg, Vijay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487966
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Martinez Perez, Gregorio. editor. Thampi, Sabu M. editor. Ko, Ryan. editor. Shu, Lei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489055
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Teufel, Stephanie. editor. A Min, Tjoa. editor. You, Illsun. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489201
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Cuppens-Boulahia, Nora. editor. Cuppens, Frederic. editor. Jajodia, Sushil. editor. Abou El Kalam, Anas. editor. Sans, Thierry. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489545
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Prakash, Atul. editor. Shyamasundar, Rudrapatna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488136
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Kotulski, Zbigniew. editor. Ksiezopolski, Bogdan. editor. Mazur, Katarzyna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded systems security practical methods for safe and secure software and systems development
ent://SD_ILS/0/SD_ILS:146451
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Kleidermacher, David. Kleidermacher, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer architecture and security : fundamentals of designing secure computer systems
ent://SD_ILS/0/SD_ILS:248865
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems
ent://SD_ILS/0/SD_ILS:145457
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Knapp, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Qian, Yi, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical embedded security building secure resource-constrained systems
ent://SD_ILS/0/SD_ILS:147416
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Stapko, Timothy John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Assessing and managing security risk in IT systems a structured methodology
ent://SD_ILS/0/SD_ILS:285488
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author McCumber, John, 1956-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enhanced methods in computer security, biometric and artificial intelligence systems
ent://SD_ILS/0/SD_ILS:109864
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Pejas, Jerzy, 1954-, ed. Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number QA76.9.A25 E545 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Cisco security professional's guide to secure intrusion detection systems
ent://SD_ILS/0/SD_ILS:254024
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet security a jumpstart for systems administrators and IT managers
ent://SD_ILS/0/SD_ILS:253843
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Speed, Tim. Ellis, Juanita.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Honeypot Frameworks and Their Applications: A New Framework
ent://SD_ILS/0/SD_ILS:399250
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author NG, Chee Keong. author. Pan, Lei. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big Digital Forensic Data Volume 2: Quick Analysis for Evidence and Intelligence
ent://SD_ILS/0/SD_ILS:399251
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Quick, Darren. author. Choo, Kim-Kwang Raymond. author. (orcid)0000-0001-9208-5336 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-0263-3">https://doi.org/10.1007/978-981-13-0263-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Location Privacy in Mobile Applications
ent://SD_ILS/0/SD_ILS:400299
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Liu, Bo. author. Zhou, Wanlei. author. Zhu, Tianqing. author. Xiang, Yong. author. Wang, Kun. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1705-7">https://doi.org/10.1007/978-981-13-1705-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big Digital Forensic Data Volume 1: Data Reduction Framework and Selective Imaging
ent://SD_ILS/0/SD_ILS:400814
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Quick, Darren. author. Choo, Kim-Kwang Raymond. author. (orcid)0000-0001-9208-5336 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7763-0">https://doi.org/10.1007/978-981-10-7763-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection using Deep Learning A Feature Learning Approach
ent://SD_ILS/0/SD_ILS:399859
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Monitoring in P2P Botnets A Dual Perspective
ent://SD_ILS/0/SD_ILS:400767
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Karuppayah, Shankar. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Johnson, Rob (Robert) Merkow, Mark S.<br/>Preferred Shelf Number QA76.9.A25 J64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:271539
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J3638 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile data loss : threats and countermeasures
ent://SD_ILS/0/SD_ILS:458729
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OS X incident response : scripting and analysis
ent://SD_ILS/0/SD_ILS:458869
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Bradley, Jaron, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:146917
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:290667
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Baker, Paul, 1958- Benny, Daniel J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Discrete dynamical systems and chaotic machines theory and applications
ent://SD_ILS/0/SD_ILS:291740
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Bahi, Jacques Mohcine. Guyeux, Christophe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466554511">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The hacker's guide to OS X exploiting OS X from the root up
ent://SD_ILS/0/SD_ILS:148006
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security patch management
ent://SD_ILS/0/SD_ILS:285191
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Nicastro, Felicia M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439825006">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security essentials
ent://SD_ILS/0/SD_ILS:287980
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Graham, James (James J.) Howard, Richard, 1959- Olson, Ryan, 1981-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439851265">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Official (ISC)2ʼ guide to the ISSMPʼ CBKʼ
ent://SD_ILS/0/SD_ILS:286114
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Tipton, Harold F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420094442">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Honeypot a new paradigm to information security
ent://SD_ILS/0/SD_ILS:288961
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Joshi, R. C. Sardana, Anjali.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managed code rootkits hooking into runtime environments
ent://SD_ILS/0/SD_ILS:147836
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Metula, Erez.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A guide to kernel exploitation attacking the core
ent://SD_ILS/0/SD_ILS:148059
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Perla, Enrico. Massimiliano, Oldani.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Haines, Brad.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:146715
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:288785
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Norman, Thomas L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:306330
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:288749
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Talukder, Asoke K. Chaitanya, Manish.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:297789
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:146805
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving & wireless penetration testing
ent://SD_ILS/0/SD_ILS:112210
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Hurley, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Essential computer security everyone's guide to e-mail, Internet, and wireless security
ent://SD_ILS/0/SD_ILS:145840
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Bradley, Tony, 1969- Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia security technologies for digital rights management
ent://SD_ILS/0/SD_ILS:254554
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Zeng, Wenjun, 1967- Yu, Hong Heather, 1967- Lin, Ching-Yung.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security a strategic approach
ent://SD_ILS/0/SD_ILS:249831
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author LeVeque, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:301860
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving drive, detect, defend : a guide to wireless security
ent://SD_ILS/0/SD_ILS:253988
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in fixed and wireless networks an introduction to securing data communications
ent://SD_ILS/0/SD_ILS:301122
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Schäfer, Günter, Dr.-Ing. John Wiley & Sons.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470863722">http://dx.doi.org/10.1002/0470863722</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198">http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html">http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
UMTS security
ent://SD_ILS/0/SD_ILS:295861
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort 2.0 intrusion detection
ent://SD_ILS/0/SD_ILS:254005
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Beale, Jay. Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2024-11-15T04:30:39Z
2024-11-15T04:30:39Z
Author Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>