Search Results for Security. - Narrowed by: English SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300$0026isd$003dtrue? 2024-12-02T15:02:57Z Security ent://SD_ILS/0/SD_ILS:264993 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Zedner, Lucia.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203871133">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SIP security ent://SD_ILS/0/SD_ILS:297791 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Sisalem, Dorgham.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security ent://SD_ILS/0/SD_ILS:342168 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Perez, Andre.<br/>Preferred Shelf Number&#160;ONLINE(342168.1)<br/>Electronic Access&#160;ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a> MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a> Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> LTE security ent://SD_ILS/0/SD_ILS:299540 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Forsberg, Dan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://lib.myilibrary.com?id=449976">Connect to MyiLibrary resource.</a> <a href="http://proquest.safaribooksonline.com/?fpi=9781118380659">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118380642">http://dx.doi.org/10.1002/9781118380642</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=51195">http://www.books24x7.com/marc.asp?bookid=51195</a> ebrary <a href="http://site.ebrary.com/id/10657818">http://site.ebrary.com/id/10657818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collective security ent://SD_ILS/0/SD_ILS:234426 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Orakhelashvili, Alexander.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199579846.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199579846.001.0001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> LTE security ent://SD_ILS/0/SD_ILS:298581 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Forsberg, Dan.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470973271">http://dx.doi.org/10.1002/9780470973271</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470661031.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470661031.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security ent://SD_ILS/0/SD_ILS:288110 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Osterhage, Wolfgang.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896266">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID security ent://SD_ILS/0/SD_ILS:254074 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Thornton, Frank.&#160;Haines, Brad.&#160;Das, Anand M.&#160;Bhargava, Hersh.&#160;Campbell, Anita.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490474">http://www.sciencedirect.com/science/book/9781597490474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> UMTS security ent://SD_ILS/0/SD_ILS:295861 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Niemi, Valtteri.&#160;Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a> Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a> John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security consulting ent://SD_ILS/0/SD_ILS:149071 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Sennewald, Charles A., 1931-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123985002">http://www.sciencedirect.com/science/book/9780123985002</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Perimeter security ent://SD_ILS/0/SD_ILS:293213 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Arata, Michael J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/perimeter-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security ent://SD_ILS/0/SD_ILS:167094 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Huang, Scott C.-H. editor.&#160;MacCallum, David. editor.&#160;Du, Ding-Zhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-73821-5">http://dx.doi.org/10.1007/978-0-387-73821-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Informatics ent://SD_ILS/0/SD_ILS:172217 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Yang, Christopher C. editor.&#160;Chau, Michael. editor.&#160;Wang, Jau-Hwang. editor.&#160;Chen, Hsinchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1325-8">http://dx.doi.org/10.1007/978-1-4419-1325-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VoIP security ent://SD_ILS/0/SD_ILS:253715 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Ransome, James F.&#160;Rittinghouse, John W.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kissell, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Security Auditing ent://SD_ILS/0/SD_ILS:483467 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Majumdar, Suryadipta. author. (orcid)0000-0002-6501-4214&#160;Madi, Taous. author.&#160;Wang, Yushun. author.&#160;Tabiban, Azadeh. author.&#160;Oqaily, Momen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23128-6">https://doi.org/10.1007/978-3-030-23128-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:10921 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Computer Security Research Group.<br/>Preferred Shelf Number&#160;HF 5548.2 C58177 1973<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Food Chain Security ent://SD_ILS/0/SD_ILS:205524 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Alpas, Hami. editor.&#160;&Ccedil;&#305;rako&#287;lu, Beyazit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-9558-9">http://dx.doi.org/10.1007/978-90-481-9558-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing information security ent://SD_ILS/0/SD_ILS:306692 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to security ent://SD_ILS/0/SD_ILS:270130 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Fischer, Robert J.&#160;Halibozek, Edward P.&#160;Walters, David, 1963-<br/>Preferred Shelf Number&#160;HV8290 G74 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Elementary information security ent://SD_ILS/0/SD_ILS:271272 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Smith, Richard E.<br/>Preferred Shelf Number&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Construction site security ent://SD_ILS/0/SD_ILS:293203 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Arata, Michael J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/construction-site-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security patch management ent://SD_ILS/0/SD_ILS:285191 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Nicastro, Felicia M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439825006">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective security management ent://SD_ILS/0/SD_ILS:269968 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Sennewald, Charles A.<br/>Preferred Shelf Number&#160;HV8290 S46 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Contemporary security studies ent://SD_ILS/0/SD_ILS:134176 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Collins, Alan.<br/>Preferred Shelf Number&#160;JZ5588 .C675 2010<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Rethinking human security ent://SD_ILS/0/SD_ILS:303348 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Goucha, Moufida.&#160;Crowley, John, 1964-&#160;Unesco.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781444307290">http://dx.doi.org/10.1002/9781444307290</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transportation systems security ent://SD_ILS/0/SD_ILS:290598 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;McDougall, Allan.&#160;Radvanovsky, Robert.&#160;Clavadetscher, Carl.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063790">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Homeland security handbook ent://SD_ILS/0/SD_ILS:287452 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Pinkowski, Jack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849379277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transportation systems security ent://SD_ILS/0/SD_ILS:342827 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;McDougall, Allan.&#160;Radvanovsky, Robert.<br/>Preferred Shelf Number&#160;ONLINE(342827.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466528055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid computing security ent://SD_ILS/0/SD_ILS:248747 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Chakrabarti, Anirban.<br/>Preferred Shelf Number&#160;QA76.9.C58 C53 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security operations management ent://SD_ILS/0/SD_ILS:149067 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;McCrie, Robert D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750678827">http://www.sciencedirect.com/science/book/9780750678827</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> European security law ent://SD_ILS/0/SD_ILS:232258 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Trybus, Martin.&#160;White, N. D., 1961-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199218622.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199218622.001.0001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security operations management ent://SD_ILS/0/SD_ILS:112141 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;McCrie, Robert D.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750678827">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Easttom, Chuck.<br/>Preferred Shelf Number&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:253669 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Porter, Thomas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security handbook ent://SD_ILS/0/SD_ILS:284785 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Earle, Aaron E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031188">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:289155 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Peltier, Thomas R.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security handbook ent://SD_ILS/0/SD_ILS:286760 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Furht, Borivoje.&#160;Kirovski, Darko.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420038262">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:254059 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic information security ent://SD_ILS/0/SD_ILS:284578 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Wylder, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203497081">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Caldwell, Wilma, ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Social security reform ent://SD_ILS/0/SD_ILS:79257 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Diamond, Peter A.<br/>Preferred Shelf Number&#160;HD 7091 D53 2002<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Social security reform ent://SD_ILS/0/SD_ILS:231851 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Diamond, Peter A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199247899.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199247899.001.0001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security architecture ent://SD_ILS/0/SD_ILS:285815 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031034">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Urban water security ent://SD_ILS/0/SD_ILS:424387 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Brears, Robert C., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1002/9781119131755">Wiley Online Library</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Port security management ent://SD_ILS/0/SD_ILS:356427 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Christopher, Kenneth, 1954- author.<br/>Preferred Shelf Number&#160;ONLINE(356427.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466591646">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security ent://SD_ILS/0/SD_ILS:518388 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Goel, Sanjay. author.&#160;Hong, Yuan. author.&#160;Papakonstantinou, Vagelis. author.&#160;Kloza, Dariusz. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518388.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6663-4">https://doi.org/10.1007/978-1-4471-6663-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:342584 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;ONLINE(342584.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:487072 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stalla-Bourdillon, Sophie. author.&#160;Phillips, Joshua. author.&#160;Ryan, Mark D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:332865 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Al-Shaer, Ehab. editor.&#160;Ou, Xinming. editor.&#160;Xie, Geoffrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332865.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pro Spring Security ent://SD_ILS/0/SD_ILS:330643 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Scarioni, Carlo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330643.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4819-4">http://dx.doi.org/10.1007/978-1-4302-4819-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Apps Security ent://SD_ILS/0/SD_ILS:171688 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Gunasekera, Sheran. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4063-1">http://dx.doi.org/10.1007/978-1-4302-4063-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective physical security ent://SD_ILS/0/SD_ILS:146608 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158924">http://www.sciencedirect.com/science/book/9780124158924</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Space Security Law ent://SD_ILS/0/SD_ILS:193381 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Abeyratne, Ruwantissa. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16702-7">http://dx.doi.org/10.1007/978-3-642-16702-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security essentials ent://SD_ILS/0/SD_ILS:287980 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Graham, James (James J.)&#160;Howard, Richard, 1959-&#160;Olson, Ryan, 1981-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439851265">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective security management ent://SD_ILS/0/SD_ILS:146471 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Sennewald, Charles A., 1931-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123820129">http://www.sciencedirect.com/science/book/9780123820129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:313297 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA76.9 A25 P45 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Aviation Security Law ent://SD_ILS/0/SD_ILS:191774 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Abeyratne, Ruwantissa. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11703-9">http://dx.doi.org/10.1007/978-3-642-11703-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International Student Security ent://SD_ILS/0/SD_ILS:236218 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Marginson, Simon.&#160;Nyland, Chris .&#160;Sawir, Erlenawati .&#160;Forbes-Mewett, Helen.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511751011">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Governance ent://SD_ILS/0/SD_ILS:167709 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Solms, S.H. author.&#160;Solms, Rossouw. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-79984-1">http://dx.doi.org/10.1007/978-0-387-79984-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Infrastructure Security ent://SD_ILS/0/SD_ILS:171884 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Yeung, Alan. author.&#160;Wong, Angus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0166-8">http://dx.doi.org/10.1007/978-1-4419-0166-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk balance &amp; security ent://SD_ILS/0/SD_ILS:369260 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Van Brunschot, Erin Gibbs.&#160;Kennedy, Leslie W.<br/>Preferred Shelf Number&#160;ONLINE(369260.1)<br/>Electronic Access&#160;SAGE knowledge <a href="http://sk.sagepub.com/books/risk-balance-and-security">http://sk.sagepub.com/books/risk-balance-and-security</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:184773 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Chakrabarti, Anirban. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Network Security ent://SD_ILS/0/SD_ILS:165912 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Xiao, Yang. editor.&#160;Shen, Xuemin Sherman. editor.&#160;Du, Ding-Zhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-33112-6">http://dx.doi.org/10.1007/978-0-387-33112-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Internet Security ent://SD_ILS/0/SD_ILS:165679 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:110682 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA76.9.A25 P45 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Pro PHP Security ent://SD_ILS/0/SD_ILS:170762 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Snyder, Chris. author.&#160;Southwell, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-0057-4">http://dx.doi.org/10.1007/978-1-4302-0057-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:165113 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Mobility ent://SD_ILS/0/SD_ILS:247990 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Mitchell, Chris J., ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective physical security ent://SD_ILS/0/SD_ILS:314036 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Fennelly, Lawrence J., 1940-<br/>Preferred Shelf Number&#160;TH9705 E34 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:59768 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA 76.9.A25 P45 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security basic ent://SD_ILS/0/SD_ILS:41083 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Russell, Deborah.&#160;Gangemi, G. T., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 R87 1991<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security solutions ent://SD_ILS/0/SD_ILS:32336 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Hruska, Jan, 1957-&#160;Jackson, K. M., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.76.C6 H78 1990<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:286552 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Van der Linden, Maura A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013795">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security technologies ent://SD_ILS/0/SD_ILS:290077 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Fung, K. T. (Kwok T.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oil and security. ent://SD_ILS/0/SD_ILS:10299 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stockholm International Peace Research Institute.<br/>Preferred Shelf Number&#160;HD 9560.5 S77 1974<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hospital and healthcare security ent://SD_ILS/0/SD_ILS:145608 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Colling, Russell L.&#160;York, Tony W.&#160;Colling, Russell L. Hospital security.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856176132">http://www.sciencedirect.com/science/book/9781856176132</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:342776 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;O'Hanley, Richard.&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE(342776.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466567528">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:253616 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Knipp, Eric.&#160;Danielyan, Edgar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">http://www.sciencedirect.com/science/book/9781931836562</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:166945 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Traynor, Patrick. author.&#160;McDaniel, Patrick. author.&#160;Porta, Thomas La. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:165224 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Weippl, Edgar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Healthcare Information Security ent://SD_ILS/0/SD_ILS:167753 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Shoniregun, Charles A. author.&#160;Dube, Kudakwashe. author.&#160;Mtenzi, Fredrick. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:253725 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Environmental Security and Ecoterrorism ent://SD_ILS/0/SD_ILS:206008 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Alpas, Hami. editor.&#160;Berkowicz, Simon M. editor.&#160;Ermakova, Irina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-1235-5">http://dx.doi.org/10.1007/978-94-007-1235-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radiobiology and Environmental Security ent://SD_ILS/0/SD_ILS:206216 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Mothersill, Carmel E. editor.&#160;Korogodina, Victoria. editor.&#160;Seymour, Colin B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-1939-2">http://dx.doi.org/10.1007/978-94-007-1939-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> LTE Security Second Edition. ent://SD_ILS/0/SD_ILS:318964 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Forsberg, Dan.&#160;Horn, G?nther.&#160;Moeller, Wolf-Dietrich.&#160;Niemi, Valtteri.<br/>Preferred Shelf Number&#160;ONLINE(318964.1)<br/>Electronic Access&#160;123Library.org <a href="http://www.123library.org/book_details/?id=64592">http://www.123library.org/book_details/?id=64592</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1120702">http://public.eblib.com/choice/publicfullrecord.aspx?p=1120702</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470973271">http://dx.doi.org/10.1002/9780470973271</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470661031.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470661031.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Comparative regional security governance ent://SD_ILS/0/SD_ILS:260751 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Breslin, Shaun.&#160;Croft, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203126127">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and everyday life ent://SD_ILS/0/SD_ILS:265343 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bajc, Vida.&#160;De Lint, Willem, 1959-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203832523">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security of mobile communications ent://SD_ILS/0/SD_ILS:286605 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Boudriga, Noureddine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849379420">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:144722 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Mather, Tim.&#160;Kumaraswamy, Subra.&#160;Latif, Shahed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> WiMAX standards and security ent://SD_ILS/0/SD_ILS:291343 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Ahson, Syed.&#160;Ilyas, Mohammad, 1953-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420045246">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for ubiquitous computing ent://SD_ILS/0/SD_ILS:301039 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stajano, Frank.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470848693">http://dx.doi.org/10.1002/0470848693</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social security legislation 2002 ent://SD_ILS/0/SD_ILS:517299 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bonner, David.<br/>Preferred Shelf Number&#160;KD3194 S63 2002 V.2<br/>Format:&#160;Books<br/>Availability&#160;Law Library~3<br/> Social security in Britain ent://SD_ILS/0/SD_ILS:96871 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;McKay, Stephen.&#160;Rowlingson, Karen.<br/>Preferred Shelf Number&#160;HD 7165 M35 1999<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Practical computer network security ent://SD_ILS/0/SD_ILS:61567 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Hendry, Mike.<br/>Preferred Shelf Number&#160;TK 5105.59 H46 1995<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:399211 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Guo, Fuchun. author.&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Mu, Yi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of personal security ent://SD_ILS/0/SD_ILS:390540 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Carroll, Patrick J.&#160;Arkin, Robert M.&#160;Wichman, Aaron L.<br/>Preferred Shelf Number&#160;BF575.S35 H36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network and system security ent://SD_ILS/0/SD_ILS:306690 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security studies an introduction ent://SD_ILS/0/SD_ILS:261557 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Williams, Paul, 1975-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203122570">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security policy guidebook ent://SD_ILS/0/SD_ILS:299195 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bayuk, Jennifer L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118241530">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://lib.myilibrary.com?id=450182">Connect to MyiLibrary resource.</a> ebrary <a href="http://site.ebrary.com/id/10630610">http://site.ebrary.com/id/10630610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290763 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Homeland security the essentials ent://SD_ILS/0/SD_ILS:145452 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bullock, Jane A.&#160;Haddow, George D.&#160;Coppola, Damon P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158030">http://www.sciencedirect.com/science/book/9780124158030</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:288856 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elements of Computer Security ent://SD_ILS/0/SD_ILS:168393 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-006-9">http://dx.doi.org/10.1007/978-0-85729-006-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289734 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International security and conflict ent://SD_ILS/0/SD_ILS:134121 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Russett, Bruce M.<br/>Preferred Shelf Number&#160;JZ5588 .I577 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security : contemporary cases ent://SD_ILS/0/SD_ILS:111021 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Wright, Marie A.&#160;Kakalik, John S.<br/>Preferred Shelf Number&#160;QA76.9.A25 W75 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security cost management ent://SD_ILS/0/SD_ILS:286545 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bazavan, Ioana V.&#160;Lim, Ian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013832">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:285161 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:108909 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bidgoli, Hossein, ed.<br/>Preferred Shelf Number&#160;TK5105.59 H35 2006 V.1<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical security for IT ent://SD_ILS/0/SD_ILS:253855 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Erbschloe, Michael, 1951-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:284764 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Wireless Security ent://SD_ILS/0/SD_ILS:247682 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Temple, Robert, ed.&#160;Regnault, John, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security risk management ent://SD_ILS/0/SD_ILS:32379 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Palmer, Ian C.&#160;Potter, G. A., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 P182 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cyber-Physical Systems Security ent://SD_ILS/0/SD_ILS:399914 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:341816 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Abbadi, Imad M., author.<br/>Preferred Shelf Number&#160;ONLINE(341816.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a> <a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Preferred Shelf Number&#160;HF5548.37 W67 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Soils and food security ent://SD_ILS/0/SD_ILS:343077 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Hester, R. E. (Ronald E.)&#160;Harrison, Roy M., 1948-<br/>Preferred Shelf Number&#160;ONLINE(343077.1)<br/>Electronic Access&#160;<a href="http://msvu.eblib.com/patron/FullRecord.aspx?p=1186091">Check for Full Text</a> Access restricted: MSVU users only Royal Society of Chemistry <a href="http://dx.doi.org/10.1039/9781849735438">http://dx.doi.org/10.1039/9781849735438</a> ebrary <a href="http://site.ebrary.com/id/10640411">http://site.ebrary.com/id/10640411</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1186091">http://swb.eblib.com/patron/FullRecord.aspx?p=1186091</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Embedded Devices ent://SD_ILS/0/SD_ILS:172275 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Gebotys, Catherine H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:146346 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Online Business Security Systems ent://SD_ILS/0/SD_ILS:166641 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Williams, Godfried B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:112183 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Population and global security ent://SD_ILS/0/SD_ILS:310627 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Polunin, Nicholas (Nicholas Vladimir C.), 1909-1997.<br/>Preferred Shelf Number&#160;HB883.5 P645 1998<br/>Format:&#160;Books<br/>Availability&#160;Health Sciences Library~1<br/> East European security reconsidered ent://SD_ILS/0/SD_ILS:71051 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lampe, John R., ed.&#160;Nelson, Daniel N., ed.<br/>Preferred Shelf Number&#160;DJK 51 E254 1993<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:288306 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kairab, Sudhanshu.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:253656 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Erbschloe, Michael.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Geographic uncertainty in environmental security ent://SD_ILS/0/SD_ILS:113611 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;NATO Advanced Research Workshop on Fuzziness and Uncertainty in GIS for Environmental Security and Protection (2006 : Kyev, Ukraine)&#160;Morris, Ashley.&#160;Kokhan, Svitlana.<br/>Preferred Shelf Number&#160;GE140 .N38 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Feminist security studies a narrative approach ent://SD_ILS/0/SD_ILS:265425 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Wibben, Annick T. R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203834886">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:253954 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Foster, James C.&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Federated Learning ent://SD_ILS/0/SD_ILS:520302 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Yu, Shui. author. (orcid)&#160;Cui, Lei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520302.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-8692-5">https://doi.org/10.1007/978-981-19-8692-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:172782 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Probst, Christian W. editor.&#160;Hunker, Jeffrey. editor.&#160;Gollmann, Dieter. editor.&#160;Bishop, Matt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Dependability for Ambient Intelligence ent://SD_ILS/0/SD_ILS:167907 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kokolakis, Spyros. editor.&#160;G&oacute;mez, Antonio Ma&ntilde;a. editor.&#160;Spanoudakis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88775-3">http://dx.doi.org/10.1007/978-0-387-88775-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:166353 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Liu, Donggang. author.&#160;Ning, Peng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:166393 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Frye, Douglas W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:166600 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CryptoGraphics : exploiting graphics cards for security ent://SD_ILS/0/SD_ILS:119741 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Cook, Debra L.&#160;Keromytis, Angelos.<br/>Preferred Shelf Number&#160;QA76.9.D314 C66 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:166011 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Cook, Debra L. author.&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gender and international security feminist perspectives ent://SD_ILS/0/SD_ILS:263940 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Sjoberg, Laura, 1979-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203866931">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human security in Southeast Asia ent://SD_ILS/0/SD_ILS:266587 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Nishikawa, Yukiko.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203850459">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:253949 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Snedaker, Susan.&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep Learning Applications for Cyber Security ent://SD_ILS/0/SD_ILS:486694 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704&#160;Tang, MingJian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Comparative homeland security global lessons ent://SD_ILS/0/SD_ILS:298893 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Morag, Nadav, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118048252">An electronic book accessible through the World Wide Web; click for information</a> ebrary <a href="http://site.ebrary.com/id/10500899">http://site.ebrary.com/id/10500899</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:287829 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:148884 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Environmental Security in the Arctic Ocean ent://SD_ILS/0/SD_ILS:335805 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Berkman, Paul Arthur. editor.&#160;Vylegzhanin, Alexander N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335805.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4713-5">http://dx.doi.org/10.1007/978-94-007-4713-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Sensors for Safety and Security ent://SD_ILS/0/SD_ILS:336346 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Vaseashta, Ashok. editor.&#160;Khudaverdyan, Surik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336346.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-7003-4">http://dx.doi.org/10.1007/978-94-007-7003-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security metrics a beginner's guide ent://SD_ILS/0/SD_ILS:293238 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Wong, Caroline.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:146055 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Mao, Wenji.&#160;Wang, Fei-Yue.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nanodevices and Nanomaterials for Ecological Security ent://SD_ILS/0/SD_ILS:206603 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Shunin, Yuri N. editor.&#160;Kiv, Arnold E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4119-5">http://dx.doi.org/10.1007/978-94-007-4119-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Preferred Shelf Number&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security firewalls and VPNs ent://SD_ILS/0/SD_ILS:271452 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;TK5105.59 S758 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Legal issues in information security ent://SD_ILS/0/SD_ILS:365418 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Grama, Joanna Lyn, author.<br/>Preferred Shelf Number&#160;KF1263.C65 G73 2011<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Nuclear Power and Energy Security ent://SD_ILS/0/SD_ILS:205099 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Apikyan, Samuel A. editor.&#160;Diamond, David J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-3504-2">http://dx.doi.org/10.1007/978-90-481-3504-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Energy Options Impact on Regional Security ent://SD_ILS/0/SD_ILS:205526 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Barbir, Frano. editor.&#160;Ulgiati, Sergio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-9565-7">http://dx.doi.org/10.1007/978-90-481-9565-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global &amp; regional perspective on democracy &amp; security ent://SD_ILS/0/SD_ILS:130871 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;G&uuml;ltekin, Recep.<br/>Preferred Shelf Number&#160;JZ5588 .G56 2009<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Energy and Environmental Challenges to Security ent://SD_ILS/0/SD_ILS:170538 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stec, Stephen. editor.&#160;Baraj, Besnik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-9453-8">http://dx.doi.org/10.1007/978-1-4020-9453-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Threats to Global Water Security ent://SD_ILS/0/SD_ILS:204758 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Jones, J. Anthony A. editor.&#160;Vardanian, Trahel G. editor.&#160;Hakopian, Christina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-2344-5">http://dx.doi.org/10.1007/978-90-481-2344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integration of Information for Environmental Security ent://SD_ILS/0/SD_ILS:169859 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Coskun, H. Gonca. editor.&#160;Cigizoglu, H. Kerem. editor.&#160;Maktav, M. Derya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-6575-0">http://dx.doi.org/10.1007/978-1-4020-6575-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Geographic Uncertainty in Environmental Security ent://SD_ILS/0/SD_ILS:169807 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Morris, Ashley. editor.&#160;Kokhan, Svitlana. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-6438-8">http://dx.doi.org/10.1007/978-1-4020-6438-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Sensing with Security Applications ent://SD_ILS/0/SD_ILS:169136 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Byrnes, Jim. editor.&#160;Ostheimer, Gerald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-4295-7">http://dx.doi.org/10.1007/1-4020-4295-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding emerging security challenges threats and opportunities ent://SD_ILS/0/SD_ILS:261683 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Swain, Ashok.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203105634">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global security watch--Turkey : a reference handbook ent://SD_ILS/0/SD_ILS:270003 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kibaro&#287;lu, Mustafa, 1962-&#160;Kibaro&#287;lu, Ay&#537;eg&uuml;l.&#160;Halman, Tal&acirc;t Sait.<br/>Preferred Shelf Number&#160;DR477 K53 2009<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Human trafficking, human security, and the Balkans ent://SD_ILS/0/SD_ILS:115761 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Friman, H. Richard.&#160;Reich, Simon, 1959-<br/>Preferred Shelf Number&#160;HQ281 .H84 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Actuarial practice in social security ent://SD_ILS/0/SD_ILS:81356 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Plamondon, Pierre.&#160;International Labour Office.&#160;International Social Security Association.<br/>Preferred Shelf Number&#160;HD 7091 A33 2002<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Actuarial mathematics of social security pensions ent://SD_ILS/0/SD_ILS:81354 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Iyer, Subramaniam.&#160;International Labour Office.&#160;International Social Security Association.<br/>Preferred Shelf Number&#160;HD 7091 I94 1999<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cognitive Security A System-Scientific Approach ent://SD_ILS/0/SD_ILS:520429 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Huang, Linan. author.&#160;Zhu, Quanyan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520429.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-30709-6">https://doi.org/10.1007/978-3-031-30709-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Space-Air-Ground Integrated Network Security ent://SD_ILS/0/SD_ILS:520466 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Liu, Jianwei. author.&#160;Bai, Lin. author.&#160;Jiang, Chunxiao. author.&#160;Zhang, Wei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520466.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1125-7">https://doi.org/10.1007/978-981-99-1125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical data security for bioengineers ent://SD_ILS/0/SD_ILS:482121 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Singh, Butta, 1981- editor.&#160;Saini, Barjinder Singh, 1970- editor.&#160;Singh, Dilbag, editor.&#160;Pandey, Anukul, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercryptography: Applicable Cryptography for Cyberspace Security ent://SD_ILS/0/SD_ILS:484533 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Micro-Grid Systems Security and Privacy ent://SD_ILS/0/SD_ILS:399573 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kayem, Anne V. D. M. editor.&#160;Wolthusen, Stephen D. editor.&#160;Meinel, Christoph. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Games for Network Security ent://SD_ILS/0/SD_ILS:401109 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security frameworks in contemporary electronic government ent://SD_ILS/0/SD_ILS:481820 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Abassi, Ryma, 1980- editor.&#160;Ben Chehida Douss, Aida, 1986- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:399960 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Abdallah, Asmaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:400943 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bokhari, M. U. editor.&#160;Agrawal, Namrata. editor.&#160;Saini, Dharmendra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:401003 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security for Cyber Physical Systems ent://SD_ILS/0/SD_ILS:401452 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Ali, Saqib. author.&#160;Al Balushi, Taiseera. author.&#160;Nadir, Zia. author.&#160;Hussain, Omar Khadeer. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75880-0">https://doi.org/10.1007/978-3-319-75880-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:402651 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Daimi, Kevin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:459146 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Andress, Jason, author.&#160;Leary, Mark, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research methods for cyber security ent://SD_ILS/0/SD_ILS:459500 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Edgar, Thomas W., author.&#160;Manz, David O., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128053492">http://www.sciencedirect.com/science/book/9780128053492</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:459518 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in network functions virtualization ent://SD_ILS/0/SD_ILS:459901 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Zhang, Zonghua, author.&#160;Meddahi, Ahmed, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Routledge handbook of private security studies ent://SD_ILS/0/SD_ILS:361322 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Abrahamsen, Rita, 1966- editor.&#160;Leander, Anna, editor.<br/>Preferred Shelf Number&#160;HV8290 R68 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Ecofriendly pest management for food security ent://SD_ILS/0/SD_ILS:458724 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Omkar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128032657">https://www.sciencedirect.com/science/book/9780128032657</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food security in the developing world ent://SD_ILS/0/SD_ILS:458727 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Ashley, John M., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128015940">https://www.sciencedirect.com/science/book/9780128015940</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insuring life : value, security and risk ent://SD_ILS/0/SD_ILS:377462 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lobo-Guerrero, Luis, author.<br/>Preferred Shelf Number&#160;HG8771 L58 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Multilevel security for relational databases ent://SD_ILS/0/SD_ILS:356433 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Faragallah, Osama S., author.<br/>Preferred Shelf Number&#160;ONLINE(356433.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482205404">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Routledge handbook of Latin American security ent://SD_ILS/0/SD_ILS:361320 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Mares, David R.&#160;Kacowicz, Arie Marcelo.<br/>Preferred Shelf Number&#160;JZ6009.L29 N37 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Library security : better communication, safer facilities ent://SD_ILS/0/SD_ILS:373839 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Albrecht, Steve, 1963- author.<br/>Preferred Shelf Number&#160;Z679.6 A43 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> American volunteer police : mobilizing for security ent://SD_ILS/0/SD_ILS:356399 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Greenberg, Martin Alan, author.<br/>Preferred Shelf Number&#160;ONLINE(356399.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482232554">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:356403 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;ONLINE(356403.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439895849">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and conflict in East Asia ent://SD_ILS/0/SD_ILS:378073 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tan, Andrew T. H. (Andrew Tian Huat), editor.<br/>Preferred Shelf Number&#160;UA832.5 S43 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Critical approaches to international security ent://SD_ILS/0/SD_ILS:371147 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Fierke, K. M. (Karin M.)<br/>Preferred Shelf Number&#160;JZ5588 F54 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security Planning An Applied Approach ent://SD_ILS/0/SD_ILS:518720 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lincke, Susan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518720.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16027-6">https://doi.org/10.1007/978-3-319-16027-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:285408 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Memon, Qurban Ali, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy in smart grids ent://SD_ILS/0/SD_ILS:286317 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Xiao, Yang, 1966-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439877845">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:487858 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food security in the Middle East ent://SD_ILS/0/SD_ILS:355099 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Babar, Zahra,&#160;Mirgani, Suzi,&#160;Georgetown University. Center for International and Regional Studies, associated with work.<br/>Preferred Shelf Number&#160;HD9018.M54 F66 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:355575 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Gonzalez, Deborah, author.<br/>Preferred Shelf Number&#160;ONLINE(355575.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection : residential security, proven practices ent://SD_ILS/0/SD_ILS:355716 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Miller, Jerome, author.&#160;Jones, Radford, author.<br/>Preferred Shelf Number&#160;ONLINE(355716.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009284">http://www.sciencedirect.com/science/book/9780128009284</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical security and environmental protection ent://SD_ILS/0/SD_ILS:356455 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Perdikaris, John, author.<br/>Preferred Shelf Number&#160;ONLINE(356455.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482211955">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:356556 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number&#160;ONLINE(356556.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The handbook of global security policy ent://SD_ILS/0/SD_ILS:341540 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kaldor, Mary, editor.&#160;Rangelov, Iavor, 1977- editor.<br/>Preferred Shelf Number&#160;ONLINE(341540.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118442975">http://dx.doi.org/10.1002/9781118442975</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Data analysis for network cyber-security ent://SD_ILS/0/SD_ILS:354757 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Adams, Niall M., 1968-&#160;Heard, Nicholas.<br/>Preferred Shelf Number&#160;TK5105.59 D375 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Digital video surveillance and security ent://SD_ILS/0/SD_ILS:355887 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Caputo, Anthony C.<br/>Preferred Shelf Number&#160;ONLINE(355887.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200425">http://www.sciencedirect.com/science/book/9780124200425</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Measures and metrics in corporate security ent://SD_ILS/0/SD_ILS:355952 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Campbell, George, 1942- author.<br/>Preferred Shelf Number&#160;ONLINE(355952.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006887">http://www.sciencedirect.com/science/book/9780128006887</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New telecom networks enterprises and security ent://SD_ILS/0/SD_ILS:342127 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Battu, Daniel Pierre.<br/>Preferred Shelf Number&#160;ONLINE(342127.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/PublicFullRecord.aspx?p=1816325">http://public.eblib.com/choice/PublicFullRecord.aspx?p=1816325</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119004912">http://dx.doi.org/10.1002/9781119004912</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security management a critical thinking approach ent://SD_ILS/0/SD_ILS:342845 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Preferred Shelf Number&#160;ONLINE(342845.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical layer security in wireless communications ent://SD_ILS/0/SD_ILS:342887 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Zhou, Xiangyun Sean, editor.&#160;Song, Lingyang, editor.&#160;Zhang, Yan, 1977- editor.<br/>Preferred Shelf Number&#160;ONLINE(342887.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466567016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global food security and supply ent://SD_ILS/0/SD_ILS:341677 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Martindale, Wayne, 1965-<br/>Preferred Shelf Number&#160;ONLINE(341677.1)<br/>Electronic Access&#160;Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118699324.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118699324.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118699287">http://dx.doi.org/10.1002/9781118699287</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for multihop wireless networks ent://SD_ILS/0/SD_ILS:356916 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Khan, Shafiullah, editor.&#160;Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number&#160;ONLINE(356916.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Networking Mining, Visualization, and Security ent://SD_ILS/0/SD_ILS:486051 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Panda, Mrutyunjaya. editor.&#160;Dehuri, Satchidananda. editor.&#160;Wang, Gi-Nam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05164-2">https://doi.org/10.1007/978-3-319-05164-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:487022 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;De Ryck, Philippe. author.&#160;Desmet, Lieven. author.&#160;Piessens, Frank. author.&#160;Johns, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Communication Communication, Multimedia, Security ent://SD_ILS/0/SD_ILS:489638 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Meinel, Christoph. author.&#160;Sack, Harald. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54331-9">https://doi.org/10.1007/978-3-642-54331-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Multi-hop Wireless Networks ent://SD_ILS/0/SD_ILS:485466 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Mahmoud, Mohamed M. E. A. author.&#160;Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04603-7">https://doi.org/10.1007/978-3-319-04603-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:488222 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Xiao, Sheng. author.&#160;Gong, Weibo. author.&#160;Towsley, Don. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection security personnel, proven practices ent://SD_ILS/0/SD_ILS:306635 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Miller, Jerome, author.&#160;Jones, Radford, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172296">http://www.sciencedirect.com/science/book/9780124172296</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection: aircraft security proven practices ent://SD_ILS/0/SD_ILS:306644 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Miller, Jerome.&#160;Jones, Radford.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170049">http://www.sciencedirect.com/science/book/9780124170049</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:306691 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Maritime security in Southeast Asia ent://SD_ILS/0/SD_ILS:239577 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bradford, John F.&#160;National Bureau of Asian Research (U.S.)&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nontraditional security challenges in South Asia ent://SD_ILS/0/SD_ILS:239579 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bhuiya, Abbas.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131119/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:288155 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Supply chain security a comprehensive approach ent://SD_ILS/0/SD_ILS:288156 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Arway, Arthur G.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466511903">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:290667 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Baker, Paul, 1958-&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security watermarking, steganography, and forensics ent://SD_ILS/0/SD_ILS:287151 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Shih, Frank Y.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439873328">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android security attacks and defenses ent://SD_ILS/0/SD_ILS:287193 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Misra, Anmol.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical infrastructure system security and resiliency ent://SD_ILS/0/SD_ILS:291727 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Biringer, Betty E., 1952-&#160;Vugrin, Eric D.&#160;Warren, Drake E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Routledge handbook of European security ent://SD_ILS/0/SD_ILS:261672 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Biscop, Sven.&#160;Whitman, Richard G.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203098417">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in 21st century Europe ent://SD_ILS/0/SD_ILS:389609 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Cottey, Andrew.<br/>Preferred Shelf Number&#160;UA646 C713 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:332479 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Du, Suguo. author.&#160;Zhu, Haojin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332479.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2012 ent://SD_ILS/0/SD_ILS:336088 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kim, Kuinam J. editor.&#160;Chung, Kyung-Yong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5860-5">http://dx.doi.org/10.1007/978-94-007-5860-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Network Security Theories and Applications ent://SD_ILS/0/SD_ILS:334222 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Chen, Lei. author.&#160;Ji, Jiahuang. author.&#160;Zhang, Zihong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334222.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36511-9">http://dx.doi.org/10.1007/978-3-642-36511-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research on Industrial Security Theory ent://SD_ILS/0/SD_ILS:334329 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Li, Menggang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334329.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36952-0">http://dx.doi.org/10.1007/978-3-642-36952-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mining Social Networks and Security Informatics ent://SD_ILS/0/SD_ILS:336224 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;&Ouml;zyer, Tansel. editor.&#160;Erdem, Zeki. editor.&#160;Rokne, Jon. editor.&#160;Khoury, Suheil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336224.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6359-3">http://dx.doi.org/10.1007/978-94-007-6359-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and modernity in Southeast Asia ent://SD_ILS/0/SD_ILS:341060 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Rappa, Antonio L.&#160;Gale Group.<br/>Preferred Shelf Number&#160;ONLINE(341060.1)<br/>Electronic Access&#160;<a href="http://find.galegroup.com/openurl/openurl?url_ver=Z39.88-2004&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&req_dat=info:sid/gale:ugnid:hu_tr&res_id=info:sid/gale:GVRL&ctx_enc=info:ofi:enc:UTF-8&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft_id=info:sid/gale:bmcode:recid/A15M">Available for Hacettepe University via Gale Virtual Reference Library. Click here to access</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Security for Cloud Computing ent://SD_ILS/0/SD_ILS:330926 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Pearson, Siani. editor.&#160;Yee, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330926.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4189-1">http://dx.doi.org/10.1007/978-1-4471-4189-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Biometrics ent://SD_ILS/0/SD_ILS:331177 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Campisi, Patrizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331177.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5230-9">http://dx.doi.org/10.1007/978-1-4471-5230-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Energy Policy and Security ent://SD_ILS/0/SD_ILS:331185 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Leal Filho, Walter. editor.&#160;Voudouris, Vlasios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331185.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5286-6">http://dx.doi.org/10.1007/978-1-4471-5286-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:331435 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Altshuler, Yaniv. editor.&#160;Elovici, Yuval. editor.&#160;Cremers, Armin B. editor.&#160;Aharony, Nadav. editor.&#160;Pentland, Alex. editor.<br/>Preferred Shelf Number&#160;ONLINE(331435.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Iris Biometrics From Segmentation to Template Security ent://SD_ILS/0/SD_ILS:331810 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Rathgeb, Christian. author.&#160;Uhl, Andreas. author.&#160;Wild, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332915.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:146934 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tam, Kenneth.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience, Security &amp; Risk in Transport ent://SD_ILS/0/SD_ILS:509892 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;IET, ed.<br/>Preferred Shelf Number&#160;XX(509892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Expert Oracle Application Express Security ent://SD_ILS/0/SD_ILS:330631 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Spendolini, Scott. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330631.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-4732-6">http://dx.doi.org/10.1007/978-1-4302-4732-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:331005 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> From Environmental to Comprehensive Security ent://SD_ILS/0/SD_ILS:332789 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Westing, Arthur H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332789.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-00687-1">http://dx.doi.org/10.1007/978-3-319-00687-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Corporate risk and national security redefined ent://SD_ILS/0/SD_ILS:262245 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Petersen, Karen Lund.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203815960">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:286136 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Speed, Tyler Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> World soil resources and food security ent://SD_ILS/0/SD_ILS:289869 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lal, R.&#160;Stewart, B. A. (Bobby Alton), 1932-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439844519">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insuring war sovereignty, security and risk ent://SD_ILS/0/SD_ILS:259821 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lobo-Guerrero, Luis.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203122075">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Motor fleet safety and security management ent://SD_ILS/0/SD_ILS:290022 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Della-Giustina, Daniel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439895085">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operational Semantics and Verification of Security Protocols ent://SD_ILS/0/SD_ILS:188195 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Cremers, Cas. author.&#160;Mauw, Sjouke. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence for Privacy and Security ent://SD_ILS/0/SD_ILS:195887 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Elizondo, David A. editor.&#160;Solanas, Agusti. editor.&#160;Martinez-Balleste, Antoni. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25237-2">http://dx.doi.org/10.1007/978-3-642-25237-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk analysis and the security survey ent://SD_ILS/0/SD_ILS:149062 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Broder, James F.&#160;Tucker, Eugene.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123822338">http://www.sciencedirect.com/science/book/9780123822338</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Social Networks Security and Privacy ent://SD_ILS/0/SD_ILS:173527 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Abraham, Ajith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4051-1">http://dx.doi.org/10.1007/978-1-4471-4051-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Hardware Security and Trust ent://SD_ILS/0/SD_ILS:173063 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tehranipoor, Mohammad. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-8080-9">http://dx.doi.org/10.1007/978-1-4419-8080-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Subjective Well-Being and Security ent://SD_ILS/0/SD_ILS:206315 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Webb, Dave. editor.&#160;Wills-Herrera, Eduardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-2278-1">http://dx.doi.org/10.1007/978-94-007-2278-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Photosensitizers in Medicine, Environment, and Security ent://SD_ILS/0/SD_ILS:205206 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Nyokong, Tebello. editor.&#160;Ahsen, Vefa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-3872-2">http://dx.doi.org/10.1007/978-90-481-3872-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Farming for Food and Water Security ent://SD_ILS/0/SD_ILS:206668 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lichtfouse, Eric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-4500-1">http://dx.doi.org/10.1007/978-94-007-4500-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:313473 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stallings, William.&#160;Brown, Lawrie<br/>Preferred Shelf Number&#160;QA76.9 S73 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information Security for Automatic Speaker Identification ent://SD_ILS/0/SD_ILS:173281 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;El-Samie, Fathi E. Abd. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-9698-5">http://dx.doi.org/10.1007/978-1-4419-9698-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security of the Persian Gulf ent://SD_ILS/0/SD_ILS:263383 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Amirsadeghi, Hossein.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203832189">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Routledge handbook of energy security ent://SD_ILS/0/SD_ILS:264401 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Sovacool, Benjamin K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203834602">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Energy security an interdisciplinary approach ent://SD_ILS/0/SD_ILS:298818 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bahgat, Gawdat.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470980170">http://dx.doi.org/10.1002/9780470980170</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=337411&ref=toc">http://www.myilibrary.com?id=337411&ref=toc</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470689042.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470689042.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:298878 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Retail security and loss prevention solutions ent://SD_ILS/0/SD_ILS:286096 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Greggo, Alan.&#160;Kresevich, Millie.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090086">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategy from requirements to reality ent://SD_ILS/0/SD_ILS:288851 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stackpole, Bill.&#160;Oksendahl, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:288879 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Liu, Lei, 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Russian energy security and foreign policy ent://SD_ILS/0/SD_ILS:261195 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Dellecker, Adrian.&#160;Gomart, Thomas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203816738">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conflict, security and development an introduction ent://SD_ILS/0/SD_ILS:261287 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Beswick, Danielle.&#160;Jackson, Paul, 1968 Apr. 24-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203810187">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security governance of regional organizations ent://SD_ILS/0/SD_ILS:262109 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Kirchner, Emil Joseph.&#160;Dominguez, Roberto, 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203805008">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insuring security biopolitics, security and risk ent://SD_ILS/0/SD_ILS:266477 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lobo-Guerrero, Luis.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203845899">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:271446 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S782 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Casino security and gaming surveillance ent://SD_ILS/0/SD_ILS:288895 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Boss, Derk J.&#160;Zajic, Alan W.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420087833">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> European Perspectives on Security Research ent://SD_ILS/0/SD_ILS:193832 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Thoma, Klaus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18219-8">http://dx.doi.org/10.1007/978-3-642-18219-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transmission Grid Security A PSA Approach ent://SD_ILS/0/SD_ILS:168435 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Haarla, Liisa. author.&#160;Koskinen, Mikko. author.&#160;Hirvonen, Ritva. author.&#160;Labeau, Pierre-Etienne. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-85729-145-5">http://dx.doi.org/10.1007/978-0-85729-145-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:172455 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;van Tilborg, Henk C. A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Criminologists on Terrorism and Homeland Security ent://SD_ILS/0/SD_ILS:236850 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Forst, Brian.&#160;Greene, Jack R..&#160;Lynch, James P..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511976384">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Private security and the law ent://SD_ILS/0/SD_ILS:147271 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Nemeth, Charles P., 1951-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123869227">http://www.sciencedirect.com/science/book/9780123869227</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CyberForensics Understanding Information Security Investigations ent://SD_ILS/0/SD_ILS:175048 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Bayuk, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-60761-772-3">http://dx.doi.org/10.1007/978-1-60761-772-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Hardware-Intrinsic Security Foundations and Practice ent://SD_ILS/0/SD_ILS:192659 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14452-3">http://dx.doi.org/10.1007/978-3-642-14452-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Climate Change, Ethics and Human Security ent://SD_ILS/0/SD_ILS:238958 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;O'Brien, Karen.&#160;St. Clair, Asunci&oacute;n Lera.&#160;Kristoffersen, Berit.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511762475">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Routledge handbook of security studies ent://SD_ILS/0/SD_ILS:262945 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Dunn Cavelty, Myriam.&#160;Mauer, Victor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203866764">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical security studies an introduction ent://SD_ILS/0/SD_ILS:264577 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Peoples, Columba.&#160;Vaughan-Williams, Nick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203847473">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food security, nutrition and sustainability ent://SD_ILS/0/SD_ILS:267085 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Lawrence, Geoffrey.&#160;Lyons, Kristen.&#160;Wallington, Tabatha.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9781849774499">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food security and global environmental change ent://SD_ILS/0/SD_ILS:267099 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Liverman, Diana M.&#160;Ericksen, Polly.&#160;Ingram, J. S. I.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9781849776615">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:288785 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Norman, Thomas L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Urbanization, policing, and security global perspectives ent://SD_ILS/0/SD_ILS:288950 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Cordner, Gary W.&#160;Cordner, AnnMarie.&#160;Das, Dilip K., 1941-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420085587">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Volume 4 ent://SD_ILS/0/SD_ILS:289735 2024-12-02T15:02:57Z 2024-12-02T15:02:57Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>