Search Results for Security. - Narrowed by: 2014 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ps$003d300$0026isd$003dtrue? 2024-12-03T04:09:26Z Network Security ent://SD_ILS/0/SD_ILS:342168 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Perez, Andre.<br/>Preferred Shelf Number&#160;ONLINE(342168.1)<br/>Electronic Access&#160;ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a> MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a> Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing information security ent://SD_ILS/0/SD_ILS:306692 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:342584 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;ONLINE(342584.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:487072 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Stalla-Bourdillon, Sophie. author.&#160;Phillips, Joshua. author.&#160;Ryan, Mark D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:342776 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;O'Hanley, Richard.&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE(342776.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466567528">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and system security ent://SD_ILS/0/SD_ILS:306690 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:341816 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Abbadi, Imad M., author.<br/>Preferred Shelf Number&#160;ONLINE(341816.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a> <a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:285408 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Memon, Qurban Ali, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy in smart grids ent://SD_ILS/0/SD_ILS:286317 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Xiao, Yang, 1966-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439877845">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The handbook of global security policy ent://SD_ILS/0/SD_ILS:341540 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kaldor, Mary, editor.&#160;Rangelov, Iavor, 1977- editor.<br/>Preferred Shelf Number&#160;ONLINE(341540.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118442975">http://dx.doi.org/10.1002/9781118442975</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical layer security in wireless communications ent://SD_ILS/0/SD_ILS:342887 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Zhou, Xiangyun Sean, editor.&#160;Song, Lingyang, editor.&#160;Zhang, Yan, 1977- editor.<br/>Preferred Shelf Number&#160;ONLINE(342887.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466567016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Food security in the Middle East ent://SD_ILS/0/SD_ILS:355099 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Babar, Zahra,&#160;Mirgani, Suzi,&#160;Georgetown University. Center for International and Regional Studies, associated with work.<br/>Preferred Shelf Number&#160;HD9018.M54 F66 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Digital video surveillance and security ent://SD_ILS/0/SD_ILS:355887 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Caputo, Anthony C.<br/>Preferred Shelf Number&#160;ONLINE(355887.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200425">http://www.sciencedirect.com/science/book/9780124200425</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Measures and metrics in corporate security ent://SD_ILS/0/SD_ILS:355952 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Campbell, George, 1942- author.<br/>Preferred Shelf Number&#160;ONLINE(355952.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006887">http://www.sciencedirect.com/science/book/9780128006887</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical security and environmental protection ent://SD_ILS/0/SD_ILS:356455 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Perdikaris, John, author.<br/>Preferred Shelf Number&#160;ONLINE(356455.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482211955">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global food security and supply ent://SD_ILS/0/SD_ILS:341677 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Martindale, Wayne, 1965-<br/>Preferred Shelf Number&#160;ONLINE(341677.1)<br/>Electronic Access&#160;Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118699324.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118699324.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118699287">http://dx.doi.org/10.1002/9781118699287</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data analysis for network cyber-security ent://SD_ILS/0/SD_ILS:354757 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Adams, Niall M., 1968-&#160;Heard, Nicholas.<br/>Preferred Shelf Number&#160;TK5105.59 D375 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:355575 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Gonzalez, Deborah, author.<br/>Preferred Shelf Number&#160;ONLINE(355575.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection : residential security, proven practices ent://SD_ILS/0/SD_ILS:355716 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Miller, Jerome, author.&#160;Jones, Radford, author.<br/>Preferred Shelf Number&#160;ONLINE(355716.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009284">http://www.sciencedirect.com/science/book/9780128009284</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:356556 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number&#160;ONLINE(356556.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Multi-hop Wireless Networks ent://SD_ILS/0/SD_ILS:485466 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Mahmoud, Mohamed M. E. A. author.&#160;Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04603-7">https://doi.org/10.1007/978-3-319-04603-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:487858 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Networking Mining, Visualization, and Security ent://SD_ILS/0/SD_ILS:486051 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Panda, Mrutyunjaya. editor.&#160;Dehuri, Satchidananda. editor.&#160;Wang, Gi-Nam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05164-2">https://doi.org/10.1007/978-3-319-05164-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New telecom networks enterprises and security ent://SD_ILS/0/SD_ILS:342127 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Battu, Daniel Pierre.<br/>Preferred Shelf Number&#160;ONLINE(342127.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/PublicFullRecord.aspx?p=1816325">http://public.eblib.com/choice/PublicFullRecord.aspx?p=1816325</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119004912">http://dx.doi.org/10.1002/9781119004912</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security management a critical thinking approach ent://SD_ILS/0/SD_ILS:342845 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Preferred Shelf Number&#160;ONLINE(342845.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for multihop wireless networks ent://SD_ILS/0/SD_ILS:356916 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Khan, Shafiullah, editor.&#160;Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number&#160;ONLINE(356916.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:487022 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;De Ryck, Philippe. author.&#160;Desmet, Lieven. author.&#160;Piessens, Frank. author.&#160;Johns, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:488222 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Xiao, Sheng. author.&#160;Gong, Weibo. author.&#160;Towsley, Don. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Communication Communication, Multimedia, Security ent://SD_ILS/0/SD_ILS:489638 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Meinel, Christoph. author.&#160;Sack, Harald. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54331-9">https://doi.org/10.1007/978-3-642-54331-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485743 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Gritzalis, Dimitris. editor.&#160;Kiayias, Aggelos. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487278 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487762 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Danger, Jean Luc. editor.&#160;Debbabi, Mourad. editor.&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487826 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485793 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Chow, Sherman S.M. editor.&#160;Camenisch, Jan. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485842 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Chen, Liqun. editor.&#160;Mitchell, Chris. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486671 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Saxena, Nitesh. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485531 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Chau, Michael. editor.&#160;Chen, Hsinchun. editor.&#160;Wang, G. Alan. editor.&#160;Wang, Jau-Hwang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486887 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488947 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Eckert, Claudia. editor.&#160;Katsikas, Sokratis K. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488957 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489033 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Saad, Walid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489038 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Cuellar, Jorge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489070 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Lioudakis, Georgios. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Foley, Simon. editor.&#160;Fitzgerald, William M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489091 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Au, Man Ho. editor.&#160;Carminati, Barbara. editor.&#160;Kuo, C.-C. Jay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489471 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Kremer, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489545 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The effective security officer's training manual ent://SD_ILS/0/SD_ILS:355869 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Brislin, Ralph F., author.<br/>Preferred Shelf Number&#160;ONLINE(355869.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000038">http://www.sciencedirect.com/science/book/9780128000038</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The manager's handbook for business security ent://SD_ILS/0/SD_ILS:355908 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Campbell, George, 1942-<br/>Preferred Shelf Number&#160;ONLINE(355908.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000625">http://www.sciencedirect.com/science/book/9780128000625</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preparing for next generation security leader opportunities ent://SD_ILS/0/SD_ILS:356021 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;D'Addario, Francis James.<br/>Preferred Shelf Number&#160;ONLINE(356021.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009208">http://www.sciencedirect.com/science/book/9780128009208</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security careers skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:356043 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Walker, Stephen W.&#160;Foushee, James E.<br/>Preferred Shelf Number&#160;ONLINE(356043.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social security and pension reform international perspectives ent://SD_ILS/0/SD_ILS:323378 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Turner, John A. (John Andrew), 1949 July 9-&#160;Szczepa&#324;ski, Marek, 1959-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323378.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780880994705/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, technology and global politics : thinking with Virilio ent://SD_ILS/0/SD_ILS:359058 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Lacy, Mark J.<br/>Preferred Shelf Number&#160;HM479.V57 L34 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:487946 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Nepal, Surya. editor.&#160;Pathan, Mukaddim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microbial Diversity and Biotechnology in Food Security ent://SD_ILS/0/SD_ILS:488381 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kharwar, R.N. editor.&#160;Upadhyay, R.S. editor.&#160;Dubey, N.K. editor.&#160;Raghuwanshi, Richa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1801-2">https://doi.org/10.1007/978-81-322-1801-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for Implantable Medical Devices ent://SD_ILS/0/SD_ILS:484643 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Burleson, Wayne. editor.&#160;Carrara, Sandro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-1674-6">https://doi.org/10.1007/978-1-4614-1674-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resource optimization and security for cloud services ent://SD_ILS/0/SD_ILS:341979 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Xiong, Kaiqi, author.<br/>Preferred Shelf Number&#160;ONLINE(341979.1)<br/>Electronic Access&#160;MyiLibrary <a href="http://www.myilibrary.com?id=578586">http://www.myilibrary.com?id=578586</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118898598">http://dx.doi.org/10.1002/9781118898598</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security-aware Cooperation in Cognitive Radio Networks ent://SD_ILS/0/SD_ILS:489561 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Zhang, Ning. author.&#160;Mark, Jon W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-0413-6">https://doi.org/10.1007/978-1-4939-0413-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Polish-Turkish relations from national security perspective= Relacje Polsko-Tureckie z perspektywy bezpieeczenstwa narodowego = Milli g&uuml;venlik perspektifinden Polonya -T&uuml;rkiye ili&#351;kileri. ent://SD_ILS/0/SD_ILS:292477 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Secretariat General of the National Security Council.&#160;National Security Bureau Republic of Poland.<br/>Preferred Shelf Number&#160;DR479.P7 P76 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:342886 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;DeFranco, Joanna F., author.<br/>Preferred Shelf Number&#160;ONLINE(342886.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The NSA report liberty and security in a changing world ent://SD_ILS/0/SD_ILS:324150 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Swire, Peter P., group member.&#160;Sunstein, Cass R., group member.&#160;Stone, Geoffrey R., group member.&#160;Morell, Michael J., group member.&#160;Clarke, Richard A. (Richard Alan), 1951-, group member.<br/>Preferred Shelf Number&#160;ONLINE(324150.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781400851270/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an information security awareness program defending against social engineering and technical threats ent://SD_ILS/0/SD_ILS:355618 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Gardner, Bill (Bill G.)&#160;Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number&#160;ONLINE(355618.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Safety and security review for the process industries application of HAZOP, PHA, what-if and SVA reviews ent://SD_ILS/0/SD_ILS:355564 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Nolan, Dennis P.<br/>Preferred Shelf Number&#160;ONLINE(355564.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780323322959">http://www.sciencedirect.com/science/book/9780323322959</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gender, violence, and human security critical feminist perspectives ent://SD_ILS/0/SD_ILS:241730 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Ewig, Christina.&#160;Ferree, Myra Marx.&#160;Tripp, Aili Mari.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780814770139/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> No use nuclear weapons and U.S. national security ent://SD_ILS/0/SD_ILS:321821 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Nichols, Thomas M., 1960-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(321821.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780812209068/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The memoirs and memorials of Jacques de Couture security, trade and society in 16th and 17th-century Southeast Asia ent://SD_ILS/0/SD_ILS:277903 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Coutre, Jacques de, 1577-1640, author.&#160;Coutre, Jacques de, 1577-1640. Vida de Jacques de Couture. English.&#160;Roy, Roopanjali, translator.&#160;Borschberg, Peter, editor, writer of added commentary.&#160;Project Muse, distributor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9789971696832/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unauthorized access the crisis in online privacy and security ent://SD_ILS/0/SD_ILS:285321 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Sloan, Robert H.&#160;Warner, Richard, 1946-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439830147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conflict and cooperation in cyberspace : the challenge to national security ent://SD_ILS/0/SD_ILS:286332 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Yannakogeorgos, Panayotis A., editor.&#160;Lowther, Adam, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:355829 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;ONLINE(355829.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safeguarding cultural properties : security for museums, libraries, parks, and zoos ent://SD_ILS/0/SD_ILS:355864 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Layne, Stevan P., author.<br/>Preferred Shelf Number&#160;ONLINE(355864.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201125">http://www.sciencedirect.com/science/book/9780124201125</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Low cost emergency water purification technologies integrated water security series ent://SD_ILS/0/SD_ILS:355882 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Ray, Chittaranjan.&#160;Jain, Ravi, 1935-<br/>Preferred Shelf Number&#160;ONLINE(355882.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124114654">http://www.sciencedirect.com/science/book/9780124114654</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Workplace security essentials a guide for helping organizations create safe work environments ent://SD_ILS/0/SD_ILS:355897 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Smith, Eric N. (Eric Newell), 1967-<br/>Preferred Shelf Number&#160;ONLINE(355897.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124165571">http://www.sciencedirect.com/science/book/9780124165571</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security leader insights for success lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:355933 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Komendat, Dave.<br/>Preferred Shelf Number&#160;ONLINE(355933.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008447">http://www.sciencedirect.com/science/book/9780128008447</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The science and technology of counterterrorism measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:355944 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Young, Carl S.<br/>Preferred Shelf Number&#160;ONLINE(355944.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200562">http://www.sciencedirect.com/science/book/9780124200562</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developing a comprehensive security program elements, characteristics, and leadership ent://SD_ILS/0/SD_ILS:356001 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Hayes, Bob.&#160;Kotwica, Kathleen.&#160;Lancaster, Elizabeth.<br/>Preferred Shelf Number&#160;ONLINE(356001.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009307">http://www.sciencedirect.com/science/book/9780128009307</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Drinking water security for engineers, planners, and managers : integrated water security series ent://SD_ILS/0/SD_ILS:356028 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Camarillo, Mary Kay, author.&#160;Stringfellow, William T., author.&#160;Jain, Ravi, 1935- author.<br/>Preferred Shelf Number&#160;ONLINE(356028.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124114661">http://www.sciencedirect.com/science/book/9780124114661</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk assessment and security for pipelines, tunnels, and underground rail and transit operations ent://SD_ILS/0/SD_ILS:356438 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Doro-on, Anna Maricel, 1977- author.<br/>Preferred Shelf Number&#160;ONLINE(356438.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466569348">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The frugal CISO : using innovation and smart approaches to maximize your security posture ent://SD_ILS/0/SD_ILS:356624 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Anderson, Kerry Ann, author.<br/>Preferred Shelf Number&#160;ONLINE(356624.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lives in the balance asylum adjudication by the Department of Homeland Security ent://SD_ILS/0/SD_ILS:321795 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Schoenholtz, Andrew Ian, 1951-&#160;Ramji-Nogales, Jaya.&#160;Schrag, Philip G., 1943-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(321795.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780814708774/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The rise and fall of intelligence an international security history ent://SD_ILS/0/SD_ILS:323186 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Warner, Michael.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323186.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781626160477/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Africa facing human security challenges in the 21st century ent://SD_ILS/0/SD_ILS:323298 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Mentan, Tatah, author.&#160;Project Muse, distributor.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323298.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9789956792368/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The circle of security intervention : enhancing attachment in early parent-child relationships ent://SD_ILS/0/SD_ILS:330486 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Powell, Bert, 1948-<br/>Preferred Shelf Number&#160;BF723.A75 P69 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems ent://SD_ILS/0/SD_ILS:355352 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Knapp, Eric D.&#160;Langill, Joel Thomas.<br/>Preferred Shelf Number&#160;ONLINE(355352.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated Security Systems Design A Complete Reference for Building Enterprise-Wide Digital Security Systems ent://SD_ILS/0/SD_ILS:355561 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Norman, Thomas L.<br/>Preferred Shelf Number&#160;ONLINE(355561.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000229">http://www.sciencedirect.com/science/book/9780128000229</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The handbook for school safety and security : best practices and procedures ent://SD_ILS/0/SD_ILS:355580 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Fennelly, Lawrence J., 1940- editor.&#160;Perry, Marianna A., editor.<br/>Preferred Shelf Number&#160;ONLINE(355580.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005682">http://www.sciencedirect.com/science/book/9780128005682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for business professionals how to plan, implement, and manage your company's security program ent://SD_ILS/0/SD_ILS:355603 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Wayland, Bradley A., author.<br/>Preferred Shelf Number&#160;ONLINE(355603.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005651">http://www.sciencedirect.com/science/book/9780128005651</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security risk assessment managing physical and operational security ent://SD_ILS/0/SD_ILS:355635 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;White, John M.<br/>Preferred Shelf Number&#160;ONLINE(355635.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002216">http://www.sciencedirect.com/science/book/9780128002216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tourism security strategies for effectively managing travel risk and safety ent://SD_ILS/0/SD_ILS:355736 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Tarlow, Peter E.<br/>Preferred Shelf Number&#160;ONLINE(355736.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124115705">http://www.sciencedirect.com/science/book/9780124115705</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security leader insights for effective management : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:355759 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Harrison, J. Randolph (Jewell Randolph), editor.<br/>Preferred Shelf Number&#160;ONLINE(355759.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008423">http://www.sciencedirect.com/science/book/9780128008423</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:355760 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Fahy, Bob, editor.<br/>Preferred Shelf Number&#160;ONLINE(355760.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008430">http://www.sciencedirect.com/science/book/9780128008430</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:355770 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Andress, Jason, author.<br/>Preferred Shelf Number&#160;ONLINE(355770.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:356681 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;ONLINE(356681.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Birth of the European individual : law, security, economy ent://SD_ILS/0/SD_ILS:359071 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Hurri, Samuli, author.<br/>Preferred Shelf Number&#160;KJC1012 H87 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Computer Safety, Reliability, and Security 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:482801 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bondavalli, Andrea. editor.&#160;Di Giandomenico, Felicita. editor. (orcid)0000-0002-8760-7299&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10506-2">https://doi.org/10.1007/978-3-319-10506-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ent://SD_ILS/0/SD_ILS:487178 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Hassanien, Aboul Ella. editor.&#160;Kim, Tai-Hoon. editor.&#160;Kacprzyk, Janusz. editor.&#160;Awad, Ali Ismail. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43616-5">https://doi.org/10.1007/978-3-662-43616-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485676 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bondavalli, Andrea. editor.&#160;Ceccarelli, Andrea. editor.&#160;Ortmeier, Frank. editor. (orcid)0000-0001-6186-4142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10557-4">https://doi.org/10.1007/978-3-319-10557-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication Technologies, Information Security and Sustainable Development Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486961 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Shaikh, Faisal Karim. editor.&#160;Chowdhry, Bhawani Shankar. editor.&#160;Zeadally, Sherali. editor.&#160;Hussain, Dil Muhammad Akbar. editor.&#160;Memon, Aftab Ahmed. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10987-9">https://doi.org/10.1007/978-3-319-10987-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference ent://SD_ILS/0/SD_ILS:487216 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Convergence of Food Security, Energy Security and Sustainable Agriculture ent://SD_ILS/0/SD_ILS:487963 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Songstad, David D. editor.&#160;Hatfield, Jerry L. editor.&#160;Tomes, Dwight T. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55262-5">https://doi.org/10.1007/978-3-642-55262-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488011 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Batten, Lynn. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Niu, Wenjia. editor.&#160;Warren, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive Communication and Cooperative HetNet Coexistence Selected Advances on Spectrum Sensing, Learning, and Security Approaches ent://SD_ILS/0/SD_ILS:488178 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Di Benedetto, Maria-Gabriella. editor.&#160;Bader, Faouzi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-01402-9">https://doi.org/10.1007/978-3-319-01402-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Communications, Services and Security 7th International Conference, MCSS 2014, Krakow, Poland, June 11-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488288 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Dziech, Andrzej. editor.&#160;Czyzewski, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07569-3">https://doi.org/10.1007/978-3-319-07569-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What Is Computer Science? An Information Security Perspective ent://SD_ILS/0/SD_ILS:488536 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Page, Daniel. author.&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Reconfigurable Systems Enhancing the Security Capabilities of Reconfigurable Hardware Architectures ent://SD_ILS/0/SD_ILS:488721 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Feller, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07005-2">https://doi.org/10.1007/978-3-658-07005-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food Security Among Small-Scale Agricultural Producers in Southern Africa ent://SD_ILS/0/SD_ILS:485631 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Msangi, Josephine Phillip. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09495-3">https://doi.org/10.1007/978-3-319-09495-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486701 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Sideridis, Alexander B. editor.&#160;Kardasiadou, Zoe. editor.&#160;Yialouris, Constantine P. editor.&#160;Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485732 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Felber, Pascal. editor.&#160;Garg, Vijay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:486885 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Wang, Lingyu. author.&#160;Albanese, Massimiliano. author.&#160;Jajodia, Sushil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488089 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Cleary, Frances. editor.&#160;Felici, Massimo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12574-9">https://doi.org/10.1007/978-3-319-12574-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Genomics of Plant Genetic Resources Volume 2. Crop productivity, food security and nutritional quality ent://SD_ILS/0/SD_ILS:488093 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Tuberosa, Roberto. editor.&#160;Graner, Andreas. editor.&#160;Frison, Emile. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-007-7575-6">https://doi.org/10.1007/978-94-007-7575-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488140 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Lloret Mauri, Jaime. editor.&#160;Thampi, Sabu M. editor.&#160;Rawat, Danda B. editor.&#160;Jin, Di. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44966-0">https://doi.org/10.1007/978-3-662-44966-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberpatterns Unifying Design Patterns with Security and Attack Patterns ent://SD_ILS/0/SD_ILS:488814 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Blackwell, Clive. editor.&#160;Zhu, Hong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04447-7">https://doi.org/10.1007/978-3-319-04447-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 ent://SD_ILS/0/SD_ILS:488884 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Krishnan, G. Sai Sundara. editor.&#160;Anitha, R. editor.&#160;Lekshmi, R. S. editor.&#160;Kumar, M. Senthil. editor.&#160;Bonato, Anthony. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488930 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Tryfonas, Theo. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488960 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Sperotto, Anna. editor.&#160;Doyen, Guillaume. editor.&#160;Latr&eacute;, Steven. editor.&#160;Charalambides, Marinos. editor.&#160;Stiller, Burkhard. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489055 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Teufel, Stephanie. editor.&#160;A Min, Tjoa. editor.&#160;You, Illsun. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489103 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Wagner, Roland. editor.&#160;Neuhold, Erich J. editor.&#160;Takizawa, Makoto. editor.&#160;K&uuml;ng, Josef. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Agroforestry Systems in India: Livelihood Security &amp; Ecosystem Services ent://SD_ILS/0/SD_ILS:489371 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Dagar, Jagdish Chander. editor.&#160;Singh, Anil Kumar. editor.&#160;Arunachalam, Ayyanadar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1662-9">https://doi.org/10.1007/978-81-322-1662-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489506 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Atluri, Vijay. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computing, Networking and Informatics- Volume 2 Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014) ent://SD_ILS/0/SD_ILS:489623 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kumar Kundu, Malay. editor.&#160;Mohapatra, Durga Prasad. editor.&#160;Konar, Amit. editor.&#160;Chakraborty, Aruna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07350-7">https://doi.org/10.1007/978-3-319-07350-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the sacred religion, national security, and the western state ent://SD_ILS/0/SD_ILS:322569 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bosco, Robert M.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(322569.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780472120093/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Searching for scientific womanpower technocratic feminism and the politics of national security, 1940-1980 ent://SD_ILS/0/SD_ILS:322769 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Puaca, Laura Micheletti.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(322769.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781469614441/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485473 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;J&uuml;rjens, Jan. editor.&#160;Piessens, Frank. editor.&#160;Bielova, Nataliia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04897-0">https://doi.org/10.1007/978-3-319-04897-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Technologies and Policy First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487210 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Preneel, Bart. editor.&#160;Ikonomou, Demosthenes. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54069-1">https://doi.org/10.1007/978-3-642-54069-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488978 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Francillon, Aur&eacute;lien. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08302-5">https://doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485594 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Holz, Thorsten. editor. (orcid)0000-0002-2783-1264&#160;Ioannidis, Sotiris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485702 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Stavrou, Angelos. editor.&#160;Bos, Herbert. editor.&#160;Portokalidis, Georgios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11379-1">https://doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trustworthy Service Composition The Aniketos Approach ent://SD_ILS/0/SD_ILS:485813 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Brucker, Achim. editor.&#160;Dalpiaz, Fabiano. editor. (orcid)0000-0003-4480-3887&#160;Giorgini, Paolo. editor.&#160;Meland, Per H&aring;kon. editor.&#160;Rios, Erkuden. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13518-2">https://doi.org/10.1007/978-3-319-13518-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489121 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Katsikas, Sokratis. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-53997-8">https://doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489223 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489261 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Lange, Tanja. editor.&#160;Lauter, Kristin. editor.&#160;Lison&#283;k, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485714 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bernsmed, Karin. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488920 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:488944 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Heisel, Maritta. editor.&#160;Joosen, Wouter. editor.&#160;L&oacute;pez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Technologies and Policy Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488945 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Preneel, Bart. editor.&#160;Ikonomou, Demosthenes. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06749-0">https://doi.org/10.1007/978-3-319-06749-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488954 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;De Cristofaro, Emiliano. editor.&#160;Murdoch, Steven J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08506-7">https://doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488985 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Nguyen, Phong Q. editor.&#160;Oswald, Elisabeth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55220-5">https://doi.org/10.1007/978-3-642-55220-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489005 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Benaloh, Josh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems -- CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489052 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;Robshaw, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44709-3">https://doi.org/10.1007/978-3-662-44709-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489066 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489068 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Meier, Willi. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489080 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Dietrich, Sven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08509-8">https://doi.org/10.1007/978-3-319-08509-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:489575 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44381-1">https://doi.org/10.1007/978-3-662-44381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:485697 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kott, Alexander. editor.&#160;Wang, Cliff. editor.&#160;Erbacher, Robert F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:488367 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Systems for Human Cognition Augmentation ent://SD_ILS/0/SD_ILS:488504 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Pino, Robinson E. editor.&#160;Kott, Alexander. editor.&#160;Shevenell, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10374-7">https://doi.org/10.1007/978-3-319-10374-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:484756 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Pino, Robinson E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography in Constant Parallel Time ent://SD_ILS/0/SD_ILS:488823 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Applebaum, Benny. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Touchless Palmprint Recognition Systems ent://SD_ILS/0/SD_ILS:488861 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Genovese, Angelo. author.&#160;Piuri, Vincenzo. author.&#160;Scotti, Fabio. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10365-5">https://doi.org/10.1007/978-3-319-10365-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oil sparks in the Amazon local conflicts, indigenous populations, and natural resources ent://SD_ILS/0/SD_ILS:277135 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Vasquez, Patricia I., author.&#160;Project Muse, distributor.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820346380/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> G&uuml;venlik &Ccedil;al&#305;&#351;malar&#305; Dergisi. ent://SD_ILS/0/SD_ILS:342920 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> Uluslararas&#305; g&uuml;venlik kongresi : 8-9 Ekim 2013 bildiriler kitab&#305; ent://SD_ILS/0/SD_ILS:340422 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Uluslararas&#305; G&uuml;venlik Kongresi ; (2013 : Kocaeli T&uuml;rkiye).&#160;&Ccedil;omak, Hasret.&#160;Kutlu,Ay&#351;eg&uuml;l G&ouml;kalp<br/>Preferred Shelf Number&#160;JZ5588 U239 2014 V.2<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> &#304;&#351; Hukuku ve Sosyal G&uuml;venlik Hukuku Dergisi . ent://SD_ILS/0/SD_ILS:371749 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> State behavior and the nuclear nonproliferation regime ent://SD_ILS/0/SD_ILS:324195 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Fields, Jeffrey R.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(324195.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820347882/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Improving Disaster Resilience and Mitigation - IT Means and Tools ent://SD_ILS/0/SD_ILS:483680 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Teodorescu, Horia-Nicolai. editor.&#160;Kirschenbaum, Alan. editor.&#160;Cojocaru, Svetlana. editor.&#160;Bruderlein, Claude. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-017-9136-6">https://doi.org/10.1007/978-94-017-9136-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Future of Dynamic Structural Science ent://SD_ILS/0/SD_ILS:483681 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Howard, Judith A.K. editor.&#160;Sparkes, Hazel A. editor.&#160;Raithby, Paul R. editor.&#160;Churakov, Andrei V. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-017-8550-1">https://doi.org/10.1007/978-94-017-8550-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Chemical, Biological, Radiological and Nuclear Agents for the Prevention of Terrorism Mass Spectrometry and Allied Topics ent://SD_ILS/0/SD_ILS:489576 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Banoub, Joseph. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-017-9238-7">https://doi.org/10.1007/978-94-017-9238-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The future of just war new critical essays ent://SD_ILS/0/SD_ILS:322483 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Eckert, Amy, author, editor of compilation.&#160;Gentry, Caron E., author, editor of compilation.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(322483.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820346533/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Uluslararas&#305; Enerji ve G&uuml;venlik Kongresi , 23-24 Eyl&uuml;l 2014 ent://SD_ILS/0/SD_ILS:338788 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Uluslararas&#305; Enerji ve G&uuml;venlik Kongresi (2014 : Kocaeli, T&uuml;rkiye)&#160;&Ccedil;omak, Hasret.&#160;Kutlu, Ay&#351;eg&uuml;l G&ouml;kalp.&#160;International Security Congress (2014 : Kocaeli, Turkey).<br/>Preferred Shelf Number&#160;JZ5588 U238 2014 V.1<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Polis bilimleri dergisi = Turkish journal of police studies ent://SD_ILS/0/SD_ILS:229319 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Electronic Access&#160;<a href="http://www.pa.edu.tr/?app=ED77B64B-C77A-47E1-89ED-FB78A53019E4">Elektronik Eri?im</a><br/>Format:&#160;Continuing Resources&#160;Other<br/>Availability&#160;~0<br/> Securing VoIP : keeping your VoIP network safe ent://SD_ILS/0/SD_ILS:355417 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bates, Regis J. author.<br/>Preferred Shelf Number&#160;ONLINE(355417.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:285413 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SC-FDMA for mobile communications ent://SD_ILS/0/SD_ILS:287270 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Abd el-Samie, Fathi E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466510722">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> &Ccedil;at&#305;&#351;ma &ccedil;&ouml;z&uuml;mleri ve bar&#305;&#351; ent://SD_ILS/0/SD_ILS:313154 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Akta&#351;, Murat.<br/>Preferred Shelf Number&#160;JZ6010 C38 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> Building peace from within ent://SD_ILS/0/SD_ILS:322721 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Keasley, Alphonse, editor.&#160;DeLuca, Laura, 1963- editor.&#160;Maphosa, Sylvester Bongani, editor.&#160;Africa Institute of South Africa, publisher.&#160;Project Muse, distributor.<br/>Preferred Shelf Number&#160;ONLINE(322721.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780798304412/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fateful transitions how democracies manage rising powers, from the eve of World War I to China's ascendance ent://SD_ILS/0/SD_ILS:323914 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kliman, Daniel M.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323914.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780812290295/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hoover's secret war against Axis spies ent://SD_ILS/0/SD_ILS:323929 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Batvinis, Raymond J.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323929.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780700620319/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A year at the helm of the United Nations General Assembly a vision for our century ent://SD_ILS/0/SD_ILS:324263 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Al-Nasser, Nassir Abdulaziz.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(324263.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781479841851/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:289995 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439841600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Total information risk management maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:306693 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Borek, Alexander.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sorulu cevapl&#305; yeni i&#351; sa&#287;l&#305;&#287;&#305; ve g&uuml;venli&#287;i mevzuat&#305; uygulamas&#305; ent://SD_ILS/0/SD_ILS:309867 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;&#304;nciro&#287;lu, L&uuml;tfi.<br/>Preferred Shelf Number&#160;KKX1270 I54 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Data governance creating value from information assets ent://SD_ILS/0/SD_ILS:289987 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bhansali, Neera.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439879146">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:306695 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Snedaker, Susan.&#160;Rima, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> India's rise as an Asian power nation, neighborhood, and region ent://SD_ILS/0/SD_ILS:323579 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Gordon, A. D. D.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323579.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781626161481/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unmaking the bomb a fissile material approach to nuclear disarmament and nonproliferation ent://SD_ILS/0/SD_ILS:323735 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Feiveson, Harold A.&#160;Von Hippel, Frank.&#160;Mian, Zia.&#160;Glaser, Alexander, 1969-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323735.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780262319188/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Water resources in the built environment : management issues and solutions ent://SD_ILS/0/SD_ILS:341807 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Booth, Colin (Colin A.), editor.&#160;Charlesworth, Susanne, editor.<br/>Preferred Shelf Number&#160;ONLINE(341807.1)<br/>Electronic Access&#160;Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470670910.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470670910.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118809167">http://dx.doi.org/10.1002/9781118809167</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bank fraud : using technology to combat losses ent://SD_ILS/0/SD_ILS:341942 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Subramanian, Revathi, author.<br/>Preferred Shelf Number&#160;ONLINE(341942.1)<br/>Electronic Access&#160;Bloomberg Law <a href="https://www.bloomberglaw.com/browser/105.491080">https://www.bloomberglaw.com/browser/105.491080</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=63460">http://www.books24x7.com/marc.asp?bookid=63460</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg</a> Cover <a href="http://swbplus.bsz-bw.de/bsz405667086cov.htm">http://swbplus.bsz-bw.de/bsz405667086cov.htm</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=836562">http://public.eblib.com/choice/publicfullrecord.aspx?p=836562</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial stability : fraud, confidence and the wealth of nations ent://SD_ILS/0/SD_ILS:342059 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Feldkamp, Frederick L.&#160;Whalen, R. Christopher, 1959-<br/>Preferred Shelf Number&#160;ONLINE(342059.1)<br/>Electronic Access&#160;Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118935798.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118935798.jpg</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1781086">http://public.eblib.com/choice/publicfullrecord.aspx?p=1781086</a> ebrary <a href="http://site.ebrary.com/id/10929016">http://site.ebrary.com/id/10929016</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118935835">http://dx.doi.org/10.1002/9781118935835</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chinese cybersecurity and cyberdefense ent://SD_ILS/0/SD_ILS:342155 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Ventre, Daniel.<br/>Preferred Shelf Number&#160;ONLINE(342155.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a> MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:342868 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Hagar, Jon Duncan, author.<br/>Preferred Shelf Number&#160;ONLINE(342868.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Messaging on the Internet ent://SD_ILS/0/SD_ILS:354937 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Oppliger, Rolf.<br/>Preferred Shelf Number&#160;TK5105.73 O67 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:355450 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE(355450.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:355853 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Sood, Aditya K., author.&#160;Enbody, Richard J., author.<br/>Preferred Shelf Number&#160;ONLINE(355853.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE(355909.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Surveillance and threat detection prevention versus mitigation ent://SD_ILS/0/SD_ILS:356089 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kirchner, Richard, Jr.<br/>Preferred Shelf Number&#160;ONLINE(356089.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124077805">http://www.sciencedirect.com/science/book/9780124077805</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of digital privacy simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:356123 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Cherry, Denny.&#160;LaRock, Thomas.<br/>Preferred Shelf Number&#160;ONLINE(356123.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance : the definitive guide ent://SD_ILS/0/SD_ILS:356423 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bhargav, Abhay, author.<br/>Preferred Shelf Number&#160;ONLINE(356423.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439887417">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:356396 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;ONLINE(356396.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> T&uuml;rkiye'nin Akdeniz siyaseti (1923-1939) : orta b&uuml;y&uuml;kl&uuml;kte devlet diplomasisi ve deniz g&uuml;c&uuml;n&uuml;n s&#305;n&#305;rlar&#305; ent://SD_ILS/0/SD_ILS:361819 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Barlas, Dilek.&#160;G&uuml;ven&ccedil;, Serhat.&#160;Cezar, Bar&#305;&#351;.<br/>Preferred Shelf Number&#160;DR479.M43 B3719 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Data protection for photographers : a guide to storing and protecting your valuable digital assets ent://SD_ILS/0/SD_ILS:364242 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Corrigan, Patrick H.<br/>Preferred Shelf Number&#160;TK7895.M4 C67 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> War's ends human rights, international order, and the ethics of peace ent://SD_ILS/0/SD_ILS:322051 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Murphy, James G., 1953-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(322051.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781626160286/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pakistan's counterterrorism challenge ent://SD_ILS/0/SD_ILS:322322 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Yusuf, Moeed.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(322322.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781626160613/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What we won America's secret war in Afghanistan, 1979-89 ent://SD_ILS/0/SD_ILS:323072 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Riedel, Bruce O.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323072.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780815725855/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The price of thirst global water inequality and the coming chaos ent://SD_ILS/0/SD_ILS:323587 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Piper, Karen Lynnea, 1965-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323587.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781452943718/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The deadly life of logistics mapping the violence of global trade ent://SD_ILS/0/SD_ILS:323619 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Cowen, Deborah.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323619.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781452943183/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Food, farms, and community exploring food systems ent://SD_ILS/0/SD_ILS:324380 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Chase, Lisa, author.&#160;Grubinger, Vernon P., 1957- author.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(324380.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781611686876/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Assessment of vulnerability to natural hazards : a European perspective ent://SD_ILS/0/SD_ILS:355647 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Alexander, David (David E.)&#160;Birkmann, J&ouml;rn.&#160;Kienberger, Stefan.<br/>Preferred Shelf Number&#160;ONLINE(355647.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105287">http://www.sciencedirect.com/science/book/9780124105287</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection : vehicle operations and safety ; proven practices ent://SD_ILS/0/SD_ILS:355713 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Miller, Jerome, author.&#160;Jones, Radford, author.<br/>Preferred Shelf Number&#160;ONLINE(355713.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009253">http://www.sciencedirect.com/science/book/9780128009253</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personnel protection : threat assessment profile ; proven practices ent://SD_ILS/0/SD_ILS:355714 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Miller, Jerome, author.&#160;Jones, Radford, author.<br/>Preferred Shelf Number&#160;ONLINE(355714.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009260">http://www.sciencedirect.com/science/book/9780128009260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion detection in wireless ad-hoc networks ent://SD_ILS/0/SD_ILS:356477 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Chaki, Nabendu, editor.&#160;Chaki, Rituparna, editor.<br/>Preferred Shelf Number&#160;ONLINE(356477.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466515673">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:356516 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number&#160;ONLINE(356516.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:356657 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;ONLINE(356657.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sosyal sigorta yard&#305;mlar&#305;na hak kazanma ko&#351;ullar&#305; ve e&#351;itlik ilkesi ent://SD_ILS/0/SD_ILS:360148 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Mutlay, Faruk Bar&#305;&#351;<br/>Preferred Shelf Number&#160;KKX1472 M88 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> &#304;&#351; sa&#287;l&#305;&#287;&#305; ve i&#351; g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:360161 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Akp&#305;nar, Teoman, yazar<br/>Preferred Shelf Number&#160;HD5708.4 A56 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> T&uuml;rk genel sa&#287;l&#305;k sigortas&#305; ent://SD_ILS/0/SD_ILS:360173 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;S&ouml;zer, Ali Naz&#305;m<br/>Preferred Shelf Number&#160;KKX1504 S69 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> &#304;&#351; hukuku ve sosyal g&uuml;venlik hukuku akademik forumu (15-18 Ekim 2013 : Antalya) ent://SD_ILS/0/SD_ILS:360203 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;&#304;&#351; Hukuku ve Sosyal G&uuml;venlik Hukuku Akademik Forumu [2013 : Antalya]<br/>Preferred Shelf Number&#160;KKX1270 I85 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> &#304;&#351; ve sosyal g&uuml;venlik hukuku : (Mevzuattaki yeni d&uuml;zenlemelere g&ouml;re g&uuml;ncellenmi&#351; &#351;ekliyle) ent://SD_ILS/0/SD_ILS:360205 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Y&uuml;ksel, Hasan<br/>Preferred Shelf Number&#160;KKX1264 Y85 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> &#304;&#351; sa&#287;l&#305;&#287;&#305; ve g&uuml;venli&#287;i hukuku ent://SD_ILS/0/SD_ILS:360213 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;&Ouml;zdemir, Erdem<br/>Preferred Shelf Number&#160;KKX1310 O93 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Emsal yarg&#305;tay kararlar&#305; : i&#351; ve sosyal g&uuml;venlik hukuku ent://SD_ILS/0/SD_ILS:378651 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Meydan, Nihat&#160;Yapal, Fadime.<br/>Preferred Shelf Number&#160;KKX1270 M49 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482710 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Obaidat, Mohammad S. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44791-8">https://doi.org/10.1007/978-3-662-44791-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Computing and Services International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487154 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43908-1">https://doi.org/10.1007/978-3-662-43908-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:487333 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Vasudevan, Amit. author.&#160;McCune, Jonathan M. author.&#160;Newsome, James. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Networks and Distributed Systems International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487617 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Jahangir, Amir Hossein. editor.&#160;Movaghar, Ali. editor.&#160;Asadi, Hossein. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10903-9">https://doi.org/10.1007/978-3-319-10903-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:487747 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10530-7">https://doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:487956 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Jajodia, Sushil. editor.&#160;Kant, Krishna. editor.&#160;Samarati, Pierangela. editor.&#160;Singhal, Anoop. editor.&#160;Swarup, Vipin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9278-8">https://doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:488233 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Donovan, Peter. author.&#160;Mack, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberterrorism Understanding, Assessment, and Response ent://SD_ILS/0/SD_ILS:488243 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Chen, Thomas M. editor.&#160;Jarvis, Lee. editor.&#160;Macdonald, Stuart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-0962-9">https://doi.org/10.1007/978-1-4939-0962-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488324 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44952-3">https://doi.org/10.1007/978-3-662-44952-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pervasive Wireless Environments: Detecting and Localizing User Spoofing ent://SD_ILS/0/SD_ILS:488438 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Yang, Jie. author.&#160;Chen, Yingying. author.&#160;Trappe, Wade. author.&#160;Cheng, Jerry. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07356-9">https://doi.org/10.1007/978-3-319-07356-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Cloud Computing ent://SD_ILS/0/SD_ILS:488472 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Krcmar, Helmut. editor.&#160;Reussner, Ralf. editor.&#160;Rumpe, Bernhard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12718-7">https://doi.org/10.1007/978-3-319-12718-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework ent://SD_ILS/0/SD_ILS:488478 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Ben Ayed, Ghazi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08231-8">https://doi.org/10.1007/978-3-319-08231-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:488519 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Al-Shaer, Ehab. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10371-6">https://doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488522 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Gladyshev, Pavel. editor.&#160;Marrington, Andrew. editor.&#160;Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488530 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Zhou, Jianying. editor.&#160;Gal-Oz, Nurit. editor.&#160;Zhang, Jie. editor.&#160;Gudes, Ehud. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43813-8">https://doi.org/10.1007/978-3-662-43813-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:488634 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Proudler, Graeme. author.&#160;Chen, Liqun. author.&#160;Dalton, Chris. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488647 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Obaidat, Mohammad S. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44788-8">https://doi.org/10.1007/978-3-662-44788-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Information Systems Engineering Workshops CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488707 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Iliadis, Lazaros. editor.&#160;Papazoglou, Michael. editor.&#160;Pohl, Klaus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07869-4">https://doi.org/10.1007/978-3-319-07869-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Internet Technology 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487632 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Natarajan, Raja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04483-5">https://doi.org/10.1007/978-3-319-04483-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> G&uuml;venli&#287;in ele&#351;tirisi ent://SD_ILS/0/SD_ILS:508005 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Neocleous, Mark&#160;Ok, Tongu&ccedil;, translated<br/>Preferred Shelf Number&#160;JZ5588 N46 2014<br/>Format:&#160;Books<br/>Availability&#160;Law Library~2<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013 ent://SD_ILS/0/SD_ILS:485061 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Hameurlain, Abdelkader. editor.&#160;K&uuml;ng, Josef. editor.&#160;Wagner, Roland. editor.&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Thoai, Nam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45947-8">https://doi.org/10.1007/978-3-662-45947-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485784 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Mellouk, Abdelhamid. editor.&#160;Fowler, Scott. editor.&#160;Daachi, Boubaker. editor.&#160;Hoceini, Said. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13174-0">https://doi.org/10.1007/978-3-319-13174-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486191 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bissyand&eacute;, Tegawend&eacute; F. editor.&#160;van Stam, Gertjan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08368-1">https://doi.org/10.1007/978-3-319-08368-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:486874 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Faloutsos, Michalis. editor.&#160;Kuzmanovic, Aleksandar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04918-2">https://doi.org/10.1007/978-3-319-04918-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and cyberwarfare ent://SD_ILS/0/SD_ILS:341980 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Bernik, Igor, author.<br/>Preferred Shelf Number&#160;ONLINE(341980.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:341997 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Touhill, Gregory J., author.&#160;Touhill, C. J., 1938- author.<br/>Preferred Shelf Number&#160;ONLINE(341997.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a> ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a> MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investing for a lifetime managing wealth for the &quot;new normal&quot; ent://SD_ILS/0/SD_ILS:342032 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Marston, Richard C.<br/>Preferred Shelf Number&#160;ONLINE(342032.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707095">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707095</a> ebrary <a href="http://site.ebrary.com/id/10879748">http://site.ebrary.com/id/10879748</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118918678">http://dx.doi.org/10.1002/9781118918678</a> MyiLibrary <a href="http://www.myilibrary.com?id=621907">http://www.myilibrary.com?id=621907</a> Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{6095027C-7D7D-4964-A865-969D25E825E2}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{6095027C-7D7D-4964-A865-969D25E825E2}Img100.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developing and securing the cloud ent://SD_ILS/0/SD_ILS:342631 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;ONLINE(342631.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439862926">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial espionage : developing a counterespionage program ent://SD_ILS/0/SD_ILS:342588 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Benny, Daniel J., author.<br/>Preferred Shelf Number&#160;ONLINE(342588.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466568150">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> &#304;&#351; sa&#287;l&#305;&#287;&#305; ve i&#351; g&uuml;venli&#287;i : (a&ccedil;&#305;klamal&#305; ve uygulamal&#305;) ent://SD_ILS/0/SD_ILS:377496 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Temir, Arif,, 11970-<br/>Preferred Shelf Number&#160;HD5708.45.T9 T46 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> 1. Uluslar aras&#305; Engellilerin &#304;stihdam&#305; Sosyal G&uuml;venlik Sorunlar&#305; ve &Ccedil;&ouml;z&uuml;m &Ouml;nerileri Kongresi : 17-19 Ekim 2014, Ankara ent://SD_ILS/0/SD_ILS:385781 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Uluslar aras&#305; Engellilerin &#304;stihdam&#305; Sosyal G&uuml;venlik Sorunlar&#305; ve &Ccedil;&ouml;z&uuml;m &Ouml;nerileri Kongresi [2014 : Ankara]&#160;&#304;&ccedil;ing&uuml;r, Yakup.&#160;Ar&#305;c&#305;, Kadir.&#160;Arslantekin, Banu Altunay.<br/>Preferred Shelf Number&#160;HD7255 U49 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Electronic Identity ent://SD_ILS/0/SD_ILS:484375 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;de Andrade, Norberto Nuno Gomes. author.&#160;Chen-Wilson, Lisha. author.&#160;Argles, David. author.&#160;Wills, Gary. author.&#160;Schiano di Zenise, Michele. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Smart Embedded Devices, Platforms and Applications ent://SD_ILS/0/SD_ILS:484765 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Markantonakis, Konstantinos. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Denial of Service Attack and Defense ent://SD_ILS/0/SD_ILS:484833 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Yu, Shui. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:485543 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06811-4">https://doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486886 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Lluch Lafuente, Alberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05119-2">https://doi.org/10.1007/978-3-319-05119-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Digital Forensics: Forensic Investigation and Applications ent://SD_ILS/0/SD_ILS:487168 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Muda, Azah Kamilah. editor.&#160;Choo, Yun-Huoy. editor.&#160;Abraham, Ajith. editor.&#160;N. Srihari, Sargur. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05885-6">https://doi.org/10.1007/978-3-319-05885-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487382 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Kimppa, Kai. editor.&#160;Whitehouse, Diane. editor.&#160;Kuusela, Tiina. editor.&#160;Phahlamohlaka, Jackie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44208-1">https://doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Sketch-Based Passwords A General Framework ent://SD_ILS/0/SD_ILS:487393 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Riggan, Benjamin S. author.&#160;Snyder, Wesley E. author.&#160;Wang, Cliff. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Large-Scale Data Analytics ent://SD_ILS/0/SD_ILS:488092 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Gkoulalas-Divanis, Aris. editor.&#160;Labbi, Abderrahim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9242-9">https://doi.org/10.1007/978-1-4614-9242-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Continued Rise of the Cloud Advances and Trends in Cloud Computing ent://SD_ILS/0/SD_ILS:488899 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6452-4">https://doi.org/10.1007/978-1-4471-6452-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488934 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Linawati. editor.&#160;Mahendra, Made Sudiana. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55032-4">https://doi.org/10.1007/978-3-642-55032-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489000 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Villari, Massimo. editor.&#160;Zimmermann, Wolf. editor.&#160;Lau, Kung-Kiu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44879-3">https://doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interactive Theorem Proving 5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489018 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Klein, Gerwin. editor.&#160;Gamboa, Ruben. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08970-6">https://doi.org/10.1007/978-3-319-08970-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489025 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Domingo-Ferrer, Josep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11257-2">https://doi.org/10.1007/978-3-319-11257-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489054 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Maffei, Matteo. editor.&#160;Tuosto, Emilio. editor. (orcid)0000-0002-7032-3281&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45917-1">https://doi.org/10.1007/978-3-662-45917-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489060 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Hansen, Marit. editor.&#160;Hoepman, Jaap-Henk. editor.&#160;Leenes, Ronald. editor.&#160;Whitehouse, Diane. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55137-6">https://doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2014 Conferences Confederated International Conferences: CoopIS and ODBASE 2014, Amantea, Italy, October 27-31, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489077 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Meersman, Robert. editor.&#160;Panetto, Herve. editor. (orcid)0000-0002-5537-2261&#160;Dillon, Tharam. editor.&#160;Missikoff, Michele. editor.&#160;Liu, Lin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45563-0">https://doi.org/10.1007/978-3-662-45563-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Business Software Current Trends in Business Software Development ent://SD_ILS/0/SD_ILS:489323 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Brunetti, Gino. editor.&#160;Feld, Thomas. editor.&#160;Heuser, Lutz. editor.&#160;Schnitter, Joachim. editor.&#160;Webel, Christian. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04144-5">https://doi.org/10.1007/978-3-319-04144-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489496 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobility Data Management and Exploration ent://SD_ILS/0/SD_ILS:489503 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Pelekis, Nikos. author.&#160;Theodoridis, Yannis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-0392-4">https://doi.org/10.1007/978-1-4939-0392-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Switzerland ent://SD_ILS/0/SD_ILS:489573 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Dunn Cavelty, Myriam. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> II. Abd&uuml;lhamid d&ouml;neminde g&uuml;venlik politikalar&#305;, m&uuml;rur tezkereleri pasaportlar ve otel kay&#305;tlar&#305; : serseri, anar&#351;ist ve fesad&#305;n pe&#351;inde ent://SD_ILS/0/SD_ILS:511585 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Y&#305;lmaz, &#304;lkay, 1981-<br/>Preferred Shelf Number&#160;DR572 Y55 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Uluslararas&#305; &ouml;rg&uuml;tlerin &quot;g&uuml;venlik boyutu&quot; ent://SD_ILS/0/SD_ILS:514987 2024-12-03T04:09:26Z 2024-12-03T04:09:26Z Author&#160;Karabulut, Bilal.<br/>Preferred Shelf Number&#160;JZ4850 K36 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>