Search Results for Security. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?
2026-02-20T20:40:28Z
UMTS security
ent://SD_ILS/0/SD_ILS:295861
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Security Hippie.
ent://SD_ILS/0/SD_ILS:587563
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Engel, Barak.<br/>Preferred Shelf Number HD30.2<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003133308">https://www.taylorfrancis.com/books/9781003133308</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:539922
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429130281">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429130281">https://www.taylorfrancis.com/books/9780429130281</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:271272
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Smith, Richard E.<br/>Preferred Shelf Number QA76.9.A25 S652 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Grid computing security
ent://SD_ILS/0/SD_ILS:248747
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chakrabarti, Anirban.<br/>Preferred Shelf Number QA76.9.C58 C53 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Wireless operational security
ent://SD_ILS/0/SD_ILS:254059
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
DNS security management
ent://SD_ILS/0/SD_ILS:593802
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy vs. Security
ent://SD_ILS/0/SD_ILS:487072
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stalla-Bourdillon, Sophie. author. Phillips, Joshua. author. Ryan, Mark D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security patch management
ent://SD_ILS/0/SD_ILS:542763
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Nicastro, Felicia M., author.<br/>Preferred Shelf Number QA76.9 .A25 N53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9 A25 P45 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:110682
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9.A25 P45 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:545226
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Peltier, Thomas R., author. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number QA76.9 .A25 P427 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135493738">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security for Mobility
ent://SD_ILS/0/SD_ILS:247990
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Mitchell, Chris J., ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Testing code security
ent://SD_ILS/0/SD_ILS:546167
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Van der Linden, Maura A., author.<br/>Preferred Shelf Number QA76.9 .A25 V359 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
CYBER SECURITY ESSENTIALS
ent://SD_ILS/0/SD_ILS:540775
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429106637">https://www.taylorfrancis.com/books/9780429106637</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IM, instant messaging, security
ent://SD_ILS/0/SD_ILS:253725
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security architecture : how & why
ent://SD_ILS/0/SD_ILS:551177
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Madsen, Tom, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003339380">https://www.taylorfrancis.com/books/9781003339380</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and optimization
ent://SD_ILS/0/SD_ILS:556640
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Tanwar, Rohit, editor. Choudhury, Tanupriya, editor. Zamani, Mazdak, editor. Gupta, Sunil, 1979- editor.<br/>Preferred Shelf Number QA76.9 .A25 I63 2021<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Security Reduction
ent://SD_ILS/0/SD_ILS:399211
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Guo, Fuchun. author. Susilo, Willy. author. (orcid)0000-0002-1562-5105 Mu, Yi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T55 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:544821
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031195">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Software security : concepts & practices
ent://SD_ILS/0/SD_ILS:570473
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Khan, Suhel Ahmad, author. Kumar, Rajeev, author. Khan, R. A. (Raees Ahmad), author.<br/>Preferred Shelf Number QA76.76 .D47<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003330516">https://www.taylorfrancis.com/books/9781003330516</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategic cyber security management
ent://SD_ILS/0/SD_ILS:550021
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003244295">https://www.taylorfrancis.com/books/9781003244295</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud management and security
ent://SD_ILS/0/SD_ILS:341816
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Abbadi, Imad M., author.<br/>Preferred Shelf Number ONLINE(341816.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft windows security fundamentals
ent://SD_ILS/0/SD_ILS:112183
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Clercq, Jan de, 1968- Grillenmeier, Guido. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft windows security fundamentals
ent://SD_ILS/0/SD_ILS:146346
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Clercq, Jan de, 1968- Grillenmeier, Guido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:545277
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kairab, Sudhanshu., author.<br/>Preferred Shelf Number HF5548.32 .K345 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781135500313">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Implementing homeland security for enterprise IT
ent://SD_ILS/0/SD_ILS:253656
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CLOUD SECURITY concepts, applications and practices.
ent://SD_ILS/0/SD_ILS:582260
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Murthy, Jamuna S. Siddesh, G. M., 1981- Srinivasa, K. G.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003455448">https://www.taylorfrancis.com/books/9781003455448</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next-Generation Enterprise Security and Governance.
ent://SD_ILS/0/SD_ILS:585672
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Āhameda, Mahiuddina, editor. Moustafa, Nour, editor. Barkat, Abu, editor. Dowland, Paul, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003121541">https://www.taylorfrancis.com/books/9781003121541</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Service Oriented Architectures.
ent://SD_ILS/0/SD_ILS:542633
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Williams, Walter, author. CRC Press LLC.<br/>Preferred Shelf Number TK5105.5828 .W55 2017<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:597326
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ghonge, Mangesh, 1984- editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in intelligence and security informatics
ent://SD_ILS/0/SD_ILS:146055
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Mao, Wenji. Wang, Fei-Yue.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Johnson, Rob (Robert) Merkow, Mark S.<br/>Preferred Shelf Number QA76.9.A25 J64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Systematic security : a CISO's playbook
ent://SD_ILS/0/SD_ILS:552414
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Qader, Timur author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003616528">https://www.taylorfrancis.com/books/9781003616528</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCE
ent://SD_ILS/0/SD_ILS:553331
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Trim, Peter R. J., author. Lee, Yang-Im, author.<br/>Preferred Shelf Number HF5548.37<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003570905">https://www.taylorfrancis.com/books/9781003570905</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security technologies for law enforcement agencies
ent://SD_ILS/0/SD_ILS:589138
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Duraklar, Kazım author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597445">https://www.taylorfrancis.com/books/9781003597445</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent approaches to cyber security
ent://SD_ILS/0/SD_ILS:556106
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Shekokar, Narendra M., editor. Vasudevan, Hari, 1969- editor. Durbha, Surya Srinivas, editor. Michalas, Antonis, editor. Nagarhalli, Tatwadarshi P., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003408307">https://www.taylorfrancis.com/books/9781003408307</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DIGITAL IMAGE SECURITY techniques and applications.
ent://SD_ILS/0/SD_ILS:561973
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Singh, Amit Kumar. Berretti, Stefano. Anand, Ashima. Agrawal, Amrit Kumar.<br/>Preferred Shelf Number T385<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003468974">https://www.taylorfrancis.com/books/9781003468974</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless communication in cyber security
ent://SD_ILS/0/SD_ILS:598705
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sountharrajan, S. editor Maheswar, R. editor Rathee, Geetanjali, editor Akila, M. editor<br/>Preferred Shelf Number QA76.9 .A25 W57 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119910619</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain for information security and privacy
ent://SD_ILS/0/SD_ILS:580861
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Rao, Udai Pratap, editor.<br/>Preferred Shelf Number QA76.9 .B56 B555 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003129486">https://www.taylorfrancis.com/books/9781003129486</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Security for Agile and DevOps.
ent://SD_ILS/0/SD_ILS:584880
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Merkow, Mark S.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003265566">https://www.taylorfrancis.com/books/9781003265566</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network forensics : privacy and security
ent://SD_ILS/0/SD_ILS:555626
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Bijalwan, Anchit, author.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003045908">https://www.taylorfrancis.com/books/9781003045908</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in IoT : The Changing Perspective.
ent://SD_ILS/0/SD_ILS:573124
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chaki, Rituparna. Roy, Debdutta Barman.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003149507">https://www.taylorfrancis.com/books/9781003149507</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer science security : concepts and tools
ent://SD_ILS/0/SD_ILS:597739
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Zaidoun, Ameur Salem, author.<br/>Preferred Shelf Number QA76.9 .A25 Z35 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394163847</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building in Security at Agile Speed
ent://SD_ILS/0/SD_ILS:569102
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ransome, James. Schoenfield, Brook S. E.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003002451">https://www.taylorfrancis.com/books/9781003002451</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing security foundations and challenges
ent://SD_ILS/0/SD_ILS:580601
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber arms : security in cyberspace
ent://SD_ILS/0/SD_ILS:579643
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Abaimov, Stanislav, 1989- author. Martellini, M. (Maurizio), author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367853860">https://www.taylorfrancis.com/books/9780367853860</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security risk models for cyber insurance
ent://SD_ILS/0/SD_ILS:574860
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ríos Insua, David, 1964- editor. Baylon, Caroline, editor. Vila, Jose, editor.<br/>Preferred Shelf Number HG9963.5<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429329487">https://www.taylorfrancis.com/books/9780429329487</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Medical data security for bioengineers
ent://SD_ILS/0/SD_ILS:482121
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Singh, Butta, 1981- editor. Saini, Barjinder Singh, 1970- editor. Singh, Dilbag, editor. Pandey, Anukul, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows security monitoring : scenarios and patterns
ent://SD_ILS/0/SD_ILS:594404
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Miroshnikov, Andrei, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Proceedings of CSI 2015
ent://SD_ILS/0/SD_ILS:400943
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Bokhari, M. U. editor. Agrawal, Namrata. editor. Saini, Dharmendra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and Network Security Essentials
ent://SD_ILS/0/SD_ILS:402651
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Daimi, Kevin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security frameworks in contemporary electronic government
ent://SD_ILS/0/SD_ILS:481820
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Abassi, Ryma, 1980- editor. Ben Chehida Douss, Aida, 1986- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security: Power and Technology
ent://SD_ILS/0/SD_ILS:401003
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY STRATEGY : from requirements to reality.
ent://SD_ILS/0/SD_ILS:545098
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author STACKPOLE, BILL.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429152160">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429152160">https://www.taylorfrancis.com/books/9780429152160</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:543620
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number QA76.9 .A25 M85 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security management : a critical thinking approach
ent://SD_ILS/0/SD_ILS:539725
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Preferred Shelf Number HD61.5 .L36 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Online security for the business traveler
ent://SD_ILS/0/SD_ILS:355575
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355575.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primer on Client-Side Web Security
ent://SD_ILS/0/SD_ILS:487022
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author De Ryck, Philippe. author. Desmet, Lieven. author. Piessens, Frank. author. Johns, Martin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Cloud Storage Systems
ent://SD_ILS/0/SD_ILS:487858
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Yang, Kan. author. Jia, Xiaohua. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dynamic Secrets in Communication Security
ent://SD_ILS/0/SD_ILS:488222
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Xiao, Sheng. author. Gong, Weibo. author. Towsley, Don. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:545960
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Baker, Paul, 1958, author. Benny, Daniel J.<br/>Preferred Shelf Number HV8290 .B34 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420099645">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:547855
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number TK5105.59 .H3532 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502277">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Resilience, Security & Risk in Transport
ent://SD_ILS/0/SD_ILS:509892
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author IET, ed.<br/>Preferred Shelf Number XX(509892.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:313473
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stallings, William. Brown, Lawrie<br/>Preferred Shelf Number QA76.9 S73 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Liu, Lei, 1968, author.<br/>Preferred Shelf Number QA76.9 .A25 L587 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:298878
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:539402
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Norman, Thomas L., author.<br/>Preferred Shelf Number HV8290 .N67 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420078718">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:539948
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Trinckes, John J., author.<br/>Preferred Shelf Number HF5548.37 .T75 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439810088">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:146369
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Varsalone, Jesse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:149080
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Tyson, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:112198
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Tyson, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Vista for IT security professionals
ent://SD_ILS/0/SD_ILS:112182
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Piltzecker, Tony, 1975- Chaffin, Larry. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Vista for IT security professionals
ent://SD_ILS/0/SD_ILS:146242
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Piltzecker, Tony, 1975- Chaffin, Larry.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enhancing computer security with smart technology
ent://SD_ILS/0/SD_ILS:544823
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Vemuri, V. Rao.<br/>Preferred Shelf Number TK5105.59 .E62 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security a strategic approach
ent://SD_ILS/0/SD_ILS:249831
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author LeVeque, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stamp, Mark.<br/>Preferred Shelf Number QA76.9.A25 S69 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:301803
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Server 2003 security infrastructures
ent://SD_ILS/0/SD_ILS:253837
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Clercq, Jan de, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:314021
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number QA76.9.A25 B56 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:145680
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
HP Nonstop server security a practical handbook
ent://SD_ILS/0/SD_ILS:253849
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Hill, Terri. Alvarado, Ellen. XYPRO Technology Corporation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
NANOELECTRONIC DEVICES FOR HARDWARE AND SOFTWARE SECURITY
ent://SD_ILS/0/SD_ILS:552865
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Raj, Balwinder. Singh, Arun Kumar.<br/>Preferred Shelf Number TK7874.84<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003126645">https://www.taylorfrancis.com/books/9781003126645</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk handbook : assess, survey, audit
ent://SD_ILS/0/SD_ILS:574120
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Swanson, Charles (Chartered Security Professional), author.<br/>Preferred Shelf Number HD61.5<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003186335">https://www.taylorfrancis.com/books/9781003186335</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:271539
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J3638 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacking exposed Windows Windows security secrets & solutions
ent://SD_ILS/0/SD_ILS:293341
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Scambray, Joel. McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:484909
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sako, Kazue. editor. Schneider, Steve. editor. (orcid)0000-0001-8365-6993 Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:484910
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sako, Kazue. editor. Schneider, Steve. editor. (orcid)0000-0001-8365-6993 Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485283
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Jang, JinSoo. editor. (orcid)0000-0003-2070-2408 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485829
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 Huang, Xinyi. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485944
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Cybenko, George. editor. (orcid)0000-0001-7734-2912 Pym, David. editor. (orcid)0000-0002-6504-5838 Fila, Barbara. editor. (orcid)0000-0002-1824-7621 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486319
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Goldberg, Ian. editor. Moore, Tyler. editor. (orcid)0000-0002-8771-8191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:486636
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers
ent://SD_ILS/0/SD_ILS:482709
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810 Horne, Ross. editor. (orcid)0000-0003-0162-1901 Probst, Christian W. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483024
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Hamid, Brahim. editor. Gallina, Barbara. editor. (orcid)0000-0002-6952-1053 Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059 Elovici, Yuval. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483209
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Liu, Feng. editor. Xu, Jia. editor. Xu, Shouhuai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34637-9">https://doi.org/10.1007/978-3-030-34637-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484061
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484523
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Nielson, Flemming. editor. (orcid)0000-0001-7362-6176 Sands, David. editor. (orcid)0000-0001-6221-0503 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine Learning for Cyber Security Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484720
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chen, Xiaofeng. editor. Huang, Xinyi. editor. Zhang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30619-9">https://doi.org/10.1007/978-3-030-30619-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485420
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Mauw, Sjouke. editor. (orcid)0000-0002-2818-4433 Conti, Mauro. editor. (orcid)0000-0002-3612-1934 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-31511-5">https://doi.org/10.1007/978-3-030-31511-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486318
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Gritzalis, Stefanos. editor. Weippl, Edgar R. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Anderst-Kotsis, Gabriele. editor. Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-27813-7">https://doi.org/10.1007/978-3-030-27813-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486352
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941 Toma, Cristian. editor. (orcid)0000-0001-9316-7739 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV
ent://SD_ILS/0/SD_ILS:486379
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:486380
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:486576
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24265-7">https://doi.org/10.1007/978-3-030-24265-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486956
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483391
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814 Antón, Annie. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji
ent://SD_ILS/0/SD_ILS:483462
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Carlet, Claude. editor. Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534 Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483504
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Deng, Robert H. editor. (orcid)0000-0003-3491-8146 Gauthier-Umaña, Valérie. editor. (orcid)0000-0003-0909-7091 Ochoa, Martín. editor. (orcid)0000-0002-7816-5775 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483841
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484666
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751 Yagi, Takeshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:484089
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Vaidya, Jaideep. editor. Zhang, Xiao. editor. Li, Jin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:484239
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Vaidya, Jaideep. editor. Zhang, Xiao. editor. Li, Jin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-37337-5">https://doi.org/10.1007/978-3-030-37337-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486706
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Liu, Joseph K. editor. (orcid)0000-0001-6656-6240 Huang, Xinyi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:487069
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239 Vorobeychik, Yevgeniy. editor. (orcid)0000-0003-2471-5345 Baras, John S. editor. (orcid)0000-0002-4955-8561 Dán, György. editor. (orcid)0000-0002-4876-0223 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:399718
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Lopez, Javier. editor. Zhou, Jianying. editor. Soriano, Miguel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399957
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Meiklejohn, Sarah. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399972
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Su, Chunhua. editor. Kikuchi, Hiroaki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399995
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335 Scala, Antonio. editor. (orcid)0000-0002-3414-2686 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400077
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Castiglione, Arcangelo. editor. Pop, Florin. editor. Ficco, Massimo. editor. Palmieri, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400194
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chen, Liqun. editor. (orcid)0000-0003-2680-4907 Manulis, Mark. editor. (orcid)0000-0002-1512-9670 Schneider, Steve. editor. (orcid)0000-0001-8365-6993 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399114
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Bushnell, Linda. editor. (orcid)0000-0002-8751-2409 Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 Başar, Tamer. editor. (orcid)0000-0003-4406-7875 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01554-1">https://doi.org/10.1007/978-3-030-01554-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399425
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Liu, Feng. editor. Xu, Shouhuai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399445
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Cremers, Cas. editor. (orcid)0000-0003-0322-2293 Lehmann, Anja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399450
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Dinur, Itai. editor. Dolev, Shlomi. editor. Lodha, Sachin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:399699
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Lopez, Javier. editor. Zhou, Jianying. editor. Soriano, Miguel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401614
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kim, Howon. editor. Kim, Dong-Chan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401992
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Yang, Guomin. editor. (orcid)0000-0002-4949-7738 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402017
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Imine, Abdessamad. editor. Fernandez, José M. editor. (orcid)0000-0001-9836-3595 Marion, Jean-Yves. editor. Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450 Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:402215
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Hancke, Gerhard P. editor. Damiani, Ernesto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400513
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400640
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Bauer, Lujo. editor. Küsters, Ralf. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400786
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Qing, Sihan. editor. Mitchell, Chris. editor. Chen, Liqun. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400830
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401487
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Preneel, Bart. editor. (orcid)0000-0003-2005-9651 Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401682
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Kim, Taesoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401940
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402524
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Liu, Peng. editor. Mauw, Sjouke. editor. Stolen, Ketil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
ent://SD_ILS/0/SD_ILS:399827
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620 Ray, Indrajit. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400111
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Inomata, Atsuo. editor. Yasuda, Kan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400113
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Mouratidis, Haralambos. editor. (orcid)0000-0002-2599-0712 Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400135
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Au, Man Ho. editor. (orcid)0000-0003-2068-9530 Yiu, Siu Ming. editor. Li, Jin. editor. Luo, Xiapu. editor. Wang, Cong. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02744-5">https://doi.org/10.1007/978-3-030-02744-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485513
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Huang, Xinyi. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485531
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chau, Michael. editor. Chen, Hsinchun. editor. Wang, G. Alan. editor. Wang, Jau-Hwang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486671
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Saxena, Nitesh. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486887
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kim, Yongdae. editor. Lee, Heejo. editor. Perrig, Adrian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:486912
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chakraborty, Rajat Subhra. editor. Matyas, Vashek. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485743
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Gritzalis, Dimitris. editor. Kiayias, Aggelos. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485793
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485842
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chen, Liqun. editor. Mitchell, Chris. editor. (orcid)0000-0002-6118-0055 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487278
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Mu, Yi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487372
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
ent://SD_ILS/0/SD_ILS:487789
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kutylowski, Miroslaw. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487826
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Christianson, Bruce. editor. Malcolm, James. editor. Matyáš, Vashek. editor. Švenda, Petr. editor. Stajano, Frank. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488916
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Boureanu, Ioana. editor. Owesarski, Philippe. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488918
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chow, Sherman S.M. editor. Liu, Joseph K. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488947
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Eckert, Claudia. editor. Katsikas, Sokratis K. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ent://SD_ILS/0/SD_ILS:488956
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488957
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Christianson, Bruce. editor. Malcolm, James. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488971
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Böhme, Rainer. editor. Brenner, Michael. editor. Moore, Tyler. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489123
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kutylowski, Miroslaw. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:484564
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Abdalla, Michel. editor. (orcid)0000-0002-2447-4329 De Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:487487
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author De Decker, Bart. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488984
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Christin, Nicolas. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488986
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Lee, Hyang-Sook. editor. Han, Dong-Guk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures
ent://SD_ILS/0/SD_ILS:488996
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Aldini, Alessandro. editor. Lopez, Javier. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489016
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489026
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Mauw, Sjouke. editor. Damsgaard Jensen, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489070
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393 Lioudakis, Georgios. editor. Cuppens-Boulahia, Nora. editor. Foley, Simon. editor. Fitzgerald, William M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489541
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Naccache, David. editor. Sauveron, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489545
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Prakash, Atul. editor. Shyamasundar, Rudrapatna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487762
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Danger, Jean Luc. editor. Debbabi, Mourad. editor. Marion, Jean-Yves. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393 Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489091
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Au, Man Ho. editor. Carminati, Barbara. editor. Kuo, C.-C. Jay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489108
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Lin, Dongdai. editor. Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489033
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 Saad, Walid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489038
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Cuellar, Jorge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:489420
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Padró, Carles. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489471
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Abadi, Martín. editor. Kremer, Steve. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The best damn IT security management book period
ent://SD_ILS/0/SD_ILS:145274
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Cunningham, Bryan, JD.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud computing security : strategies and best practices
ent://SD_ILS/0/SD_ILS:572633
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Agrawal, Neha author. Kumar, Rohit (Computer scientist), author. Tapaswi, Shashikala, author.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003510772">https://www.taylorfrancis.com/books/9781003510772</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
RECENT ADVANCES IN INTERNET OF THINGS SECURITY
ent://SD_ILS/0/SD_ILS:584310
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Azrour, Mourade. Mabrouki, Jamal.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003587552">https://www.taylorfrancis.com/books/9781003587552</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Social Cyber Engineering and Advanced Security Algorithms
ent://SD_ILS/0/SD_ILS:588161
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Merat, Soorena, author. Almuhtadi, Wahab, author<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003500698">https://www.taylorfrancis.com/books/9781003500698</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the digital frontier : threats and advanced techniques in security and forensics
ent://SD_ILS/0/SD_ILS:599732
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sharma, Kavita, 1985- editor.<br/>Preferred Shelf Number QA76.9 .A25 S43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394268917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
BLOCKCHAIN AND MACHINE LEARNING FOR IOT SECURITY
ent://SD_ILS/0/SD_ILS:592780
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Azrour, Mourade. Mabrouki, Jamal. Guezzaz, Azidine. Benkirane, Said.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003438779">https://www.taylorfrancis.com/books/9781003438779</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ubiquitous and transparent security : challenges and applications
ent://SD_ILS/0/SD_ILS:557010
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kumar, A. Suresh, editor. Dhanaraj, Rajesh Kumar, editor. Maleh, Yassine, 1987- editor. Arockiam, Daniel, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003362685">https://www.taylorfrancis.com/books/9781003362685</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchain-based cyber security applications and paradigms
ent://SD_ILS/0/SD_ILS:572494
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Shah, Kaushal, 1987- editor.<br/>Preferred Shelf Number QA76.9 .B56<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003389576">https://www.taylorfrancis.com/books/9781003389576</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Security Solutions for Cyber-Physical Systems
ent://SD_ILS/0/SD_ILS:559012
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sood, Vandana Mohindru, editor. Singh, Yashwant, editor. Bhargava, Bharat, editor. Narang, Sushil Kumar, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003406105">https://www.taylorfrancis.com/books/9781003406105</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBER SECURITY FOR NEXT-GENERATION COMPUTING TECHNOLOGIES
ent://SD_ILS/0/SD_ILS:586025
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Khan, Inam Ullah. Ouaissa, Mariya. Ouaissa, Mariyam. Abou El Houda, Zakaria. Ijaz, Muhammad Fazal.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003404361">https://www.taylorfrancis.com/books/9781003404361</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
System Reliability and Security Techniques and Methodologies.
ent://SD_ILS/0/SD_ILS:576623
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Iqbal, Javaid. Masoodi, Faheem Syeed. Ahmad Malik, Ishfaq. Khurshid, Shozab. Saraf, Iqra.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032624983">https://www.taylorfrancis.com/books/9781032624983</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and resilience of cyber physical systems
ent://SD_ILS/0/SD_ILS:570281
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Goyal, K. K. (Krishan Kumar), editor. Behal, Sunny, editor. Bhandari, Abhinav, editor. Bhatia, Sajal, editor.<br/>Preferred Shelf Number TK7895 .E42<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003185543">https://www.taylorfrancis.com/books/9781003185543</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Core Software Security A Reference Framework.
ent://SD_ILS/0/SD_ILS:562758
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ransome, James F. Misra, Anmol. Merkow, Mark S.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003319078">https://www.taylorfrancis.com/books/9781003319078</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Creating an information security program from scratch
ent://SD_ILS/0/SD_ILS:576963
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number QA76.9 .A25 W55 2022<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003093688">https://www.taylorfrancis.com/books/9781003093688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber-security threats, actors, and dynamic mitigation
ent://SD_ILS/0/SD_ILS:556535
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kolokotronis, Nicholas, editor. Shiaeles, Stavros, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003006145">https://www.taylorfrancis.com/books/9781003006145</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber defense mechanisms security, privacy, and challenges
ent://SD_ILS/0/SD_ILS:571884
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kumar, Gautam, 1990- Saini, Dinesh Kumar, 1974- Cuong, Nguyen Ha Huy.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367816438">https://www.taylorfrancis.com/books/9780367816438</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber strategy : risk-driven security and resiliency
ent://SD_ILS/0/SD_ILS:585453
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Siegel, Carol A., author. Sweeney, Mark, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429323003">https://www.taylorfrancis.com/books/9780429323003</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security analytics for the internet of everything
ent://SD_ILS/0/SD_ILS:560404
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ahmed, Mohiuddin (Computer scientist) Abu Barkat, Abu. Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003010463">https://www.taylorfrancis.com/books/9781003010463</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Exploring security in software architecture and design
ent://SD_ILS/0/SD_ILS:481871
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developments in information security and cybernetic wars
ent://SD_ILS/0/SD_ILS:482187
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet of Things Security and Data Protection
ent://SD_ILS/0/SD_ILS:485847
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ziegler, Sébastien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware security : a hands-on learning approach
ent://SD_ILS/0/SD_ILS:460410
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Bhunia, Swarup, author. Tehranipoor, Mohammad H., 1974- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128124772">https://www.sciencedirect.com/science/book/9780128124772</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Layer Security in Wireless Cooperative Networks
ent://SD_ILS/0/SD_ILS:398980
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Wang, Li. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT Convergence and Security 2017 Volume 1
ent://SD_ILS/0/SD_ILS:400069
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kim, Kuinam J. editor. Kim, Hyuncheol. editor. Baek, Nakhoon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT Convergence and Security 2017 Volume 2
ent://SD_ILS/0/SD_ILS:402118
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kim, Kuinam J. editor. Kim, Hyuncheol. editor. Baek, Nakhoon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security : defending the domain name system
ent://SD_ILS/0/SD_ILS:458935
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Liska, Allan, author. Stowe, Geoffrey, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security awareness for CEOs and management
ent://SD_ILS/0/SD_ILS:458665
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy and Trust in Cloud Systems
ent://SD_ILS/0/SD_ILS:487946
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Nepal, Surya. editor. Pathan, Mukaddim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network and application security fundamentals and practices
ent://SD_ILS/0/SD_ILS:541627
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ganguly, Debashis., author. Lahiri, Shibamouli.<br/>Preferred Shelf Number TK5105.59 .G36 2012<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466502451">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:318966
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Howard, Doug. Prince, Kevin.<br/>Preferred Shelf Number ONLINE(318966.1)<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a>
ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a>
MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security strategies in Windows platforms and applications
ent://SD_ILS/0/SD_ILS:271537
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Solomon, Michael.<br/>Preferred Shelf Number QA76.76.O63 S64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:540985
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Bacik, Sandy., author.<br/>Preferred Shelf Number QA76.9 .A25 B335 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059069">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
IPTV security protecting high-value digital contents
ent://SD_ILS/0/SD_ILS:302654
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ramirez, David. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470727201">http://dx.doi.org/10.1002/9780470727201</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:545839
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Layton, Timothy P., author.<br/>Preferred Shelf Number HF5548.37 .L393 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013412">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:147664
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:110434
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Singhal, Anoop, 1958-<br/>Preferred Shelf Number QA76.9.A25 S563 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:112214
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Multimedia security technologies for digital rights management
ent://SD_ILS/0/SD_ILS:254554
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Zeng, Wenjun, 1967- Yu, Hong Heather, 1967- Lin, Ching-Yung.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security best practices 205 basic rules
ent://SD_ILS/0/SD_ILS:254779
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stefanek, George L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Relationship Management : Leveraging Marketing Concepts to Advance a Cybersecurity Program
ent://SD_ILS/0/SD_ILS:589139
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Parrish, Lee, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003597483">https://www.taylorfrancis.com/books/9781003597483</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:544973
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Herrmann, Debra S., author.<br/>Preferred Shelf Number QA76.9 .A25 H47 2002<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security and Privacy Trends in the Industrial Internet of Things
ent://SD_ILS/0/SD_ILS:486998
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
ent://SD_ILS/0/SD_ILS:484275
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CSA guide to cloud computing implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:355449
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Samani, Raj, author. Honan, Brian, author. Reavis, Jim, author. Jirasek, Vladimir, editor. CSA (Organization), issuing body.<br/>Preferred Shelf Number ONLINE(355449.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography
ent://SD_ILS/0/SD_ILS:489032
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Shi, Yun Q. editor. Liu, Feng. editor. Yan, Weiqi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
THEORISING CYBER (IN)SECURITY information, materiality, and entropic security.
ent://SD_ILS/0/SD_ILS:561001
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Fouad, Noran Shafik.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003454113">https://www.taylorfrancis.com/books/9781003454113</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security
ent://SD_ILS/0/SD_ILS:599222
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Brooks, Chuck (Writer of Inside cyber), author.<br/>Preferred Shelf Number HC79 .T4 B735 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mastering deepfake technology : strategies for ethical management and security
ent://SD_ILS/0/SD_ILS:582507
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Taneja, Sanjay, editor. Chitkara, Swati Gupta, editor. Kukreti, Mohit, editor. Chauan, Abhishek Singh, editor.<br/>Preferred Shelf Number Q335 .M37 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9788743801146">https://www.taylorfrancis.com/books/9788743801146</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Insecurity : the layman's guide to digital security and digital self-defense.
ent://SD_ILS/0/SD_ILS:584158
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Marshall, Lyndon.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003453024">https://www.taylorfrancis.com/books/9781003453024</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:539726
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Qian, Yi, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Amini, Rob. Hunter, Laura E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving drive, detect, defend : a guide to wireless security
ent://SD_ILS/0/SD_ILS:253988
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The business of cyber : why you should question what your security team are telling you
ent://SD_ILS/0/SD_ILS:592690
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Fagan, Peter (Writer on computer security), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003380962">https://www.taylorfrancis.com/books/9781003380962</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybercrime and Internet technology : theory and practice--the computer network infostructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices
ent://SD_ILS/0/SD_ILS:553601
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Alexandrou, Alex (Professor of information technology security), author.<br/>Preferred Shelf Number HV6773<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429318726">https://www.taylorfrancis.com/books/9780429318726</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:573236
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author DeFranco, Joanna F., author. Maley, Bob (Chief Security Officer), author.<br/>Preferred Shelf Number TK5105.59 .D44 2023 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003245223">https://www.taylorfrancis.com/books/9781003245223</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Technology, AI, and operational security in banking : mastering cybersecurity and tech risk management
ent://SD_ILS/0/SD_ILS:573707
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Young, Richard Gwashy, author.<br/>Preferred Shelf Number HG1709<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003654742">https://www.taylorfrancis.com/books/9781003654742</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics in next generation internet for medical things : balancing security and sustainability
ent://SD_ILS/0/SD_ILS:575627
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Saini, Hemant Kumar, editor Rani, Sita, editor Ouaissa, Mariya, editor Ouaissa, Mariyam, editor Abou El Houda, Zakaria, editor<br/>Preferred Shelf Number R859.7 .I59 D54 2026 EB<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003640325">https://www.taylorfrancis.com/books/9781003640325</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zero-trust learning : applications in modern network security
ent://SD_ILS/0/SD_ILS:580582
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kaushal, Chetna, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781779643575">https://www.taylorfrancis.com/books/9781779643575</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
State, security and cyberwar : the quest for digital peace
ent://SD_ILS/0/SD_ILS:592919
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Singh, Thangjam K., author. Jha, Sanjay K., author.<br/>Preferred Shelf Number JC311<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003630319">https://www.taylorfrancis.com/books/9781003630319</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Communication Devices, Networks and Computing Models. Volume 2
ent://SD_ILS/0/SD_ILS:580449
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kumar, Budati Anil editor Ramakrishna, Akella editor Makkena, Goutham editor Ghinea, Gheorghita, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003591788">https://www.taylorfrancis.com/books/9781003591788</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Agile security in the digital era : challenges and cybersecurity trends
ent://SD_ILS/0/SD_ILS:563898
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Zaydi, Mounia, editor.<br/>Preferred Shelf Number QA76.9 .A25 A414 2025<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478676">https://www.taylorfrancis.com/books/9781003478676</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
QUALITY ASSESSMENT AND SECURITY IN INDUSTRIAL INTERNET OF THINGS
ent://SD_ILS/0/SD_ILS:579452
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Jha, Sudan. Shakya, Sarbagya Ratna. Ahmad, Sultan. Zhou, Zhaoxian.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003530572">https://www.taylorfrancis.com/books/9781003530572</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SAFEGUARDING THE FUTURE security and privacy by design for ai, metaverse, blockchain, and beyond.
ent://SD_ILS/0/SD_ILS:573480
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Tang, Alan.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003390695">https://www.taylorfrancis.com/books/9781003390695</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
INTELLIGENT DATA DRIVEN TECHNIQUES FOR SECURITY OF DIGITAL ASSETS
ent://SD_ILS/0/SD_ILS:559167
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Rana, Arun Kumar.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003590439">https://www.taylorfrancis.com/books/9781003590439</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Issues in Communication Devices, Networks and Computing Models. Volume 1
ent://SD_ILS/0/SD_ILS:563926
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kumar, Budati Anil, editor. Ramakrishna, Akella, editor. Makkena, Goutham, editor. Ghinea, Gheorghita, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003513445">https://www.taylorfrancis.com/books/9781003513445</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and privacy quick reference the essential handbook for every CISO, CSO, and Chief Privacy Officer
ent://SD_ILS/0/SD_ILS:599946
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Chapple, Mike, author. Shelley, Joe. Stewart, James Michael.<br/>Preferred Shelf Number QA76.9 .A25 C43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394353347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ENTERPRISE FORTRESS the ultimate handbook for enterprise security architecture.
ent://SD_ILS/0/SD_ILS:591038
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stevens, Alex.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003585923">https://www.taylorfrancis.com/books/9781003585923</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC
ent://SD_ILS/0/SD_ILS:599434
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protection of electrical power distribution systems : smart grid, microgrid, AI, and cyber security
ent://SD_ILS/0/SD_ILS:600371
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Masood, Tariq, author. Abdo, Jamil, author. Iqbal, Atif, author.<br/>Preferred Shelf Number TK3001 .M37 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394327676</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY, PRIVACY, AND TRUST IN WBANS AND E HEALTHCARE
ent://SD_ILS/0/SD_ILS:552442
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Singh, Anuj Kumar. Kumar, Sachin (Computer scientist)<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032635101">https://www.taylorfrancis.com/books/9781032635101</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OFFENSIVE AND DEFENSIVE CYBER SECURITY STRATEGIES fundamentals, theory and practices.
ent://SD_ILS/0/SD_ILS:590041
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Ouaissa, Mariya. Ouaissa, Mariyam.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003509080">https://www.taylorfrancis.com/books/9781003509080</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet of Things security and privacy : practical and management perspectives
ent://SD_ILS/0/SD_ILS:553870
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Awad, Ali Ismail, editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003199410">https://www.taylorfrancis.com/books/9781003199410</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology security and risk management : inductive cases for information security
ent://SD_ILS/0/SD_ILS:562664
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Wingreen, Stephen C., editor. Samandari, Amelia, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264415">https://www.taylorfrancis.com/books/9781003264415</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY FRAMEWORK FOR THE INTERNET OF THINGS APPLICATIONS
ent://SD_ILS/0/SD_ILS:563899
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Hamad, Salma Abdalla. Sheng, Quan Z. Zhang, Wei Emma.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003478683">https://www.taylorfrancis.com/books/9781003478683</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fusion of artificial intelligence and machine learning in advanced image processing, data analysis, and cyber security
ent://SD_ILS/0/SD_ILS:581353
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Rana, Arun Kumar, editor.<br/>Preferred Shelf Number Q335<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003493570">https://www.taylorfrancis.com/books/9781003493570</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of security and privacy of AI-enabled healthcare systems and internet of medical things
ent://SD_ILS/0/SD_ILS:585039
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Imoize, Agbotiname Lucky, editor. Balas, Valentina Emilia, editor. Solanki, Vijender Kumar, 1980- editor. Lee, Cheng-Chi, editor. Obaidat, Mohammad S. (Mohammad Salameh), 1952- editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003370321">https://www.taylorfrancis.com/books/9781003370321</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and business intelligence : innovations and machine learning for cyber risk management
ent://SD_ILS/0/SD_ILS:553989
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Abedin, Mohammad Zoynul, editor. Hájek, Petr, editor.<br/>Preferred Shelf Number HD38.7<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003285854">https://www.taylorfrancis.com/books/9781003285854</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
BLOCKCHAIN AND DIGITAL TWIN ENABLED IOT NETWORKS privacy and security.
ent://SD_ILS/0/SD_ILS:569607
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kumar, Randhir. Kumar, Prabhat. C C, Sobin.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003403791">https://www.taylorfrancis.com/books/9781003403791</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The DevSecOps playbook : deliver continuous security at speed
ent://SD_ILS/0/SD_ILS:598634
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
EXPERT IN THE NEXT OFFICE managing operations & security in the era of cyberspace.
ent://SD_ILS/0/SD_ILS:569548
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Kabay, M. E.<br/>Preferred Shelf Number HF5548.2<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003354536">https://www.taylorfrancis.com/books/9781003354536</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence technology in healthcare : security and privacy issues
ent://SD_ILS/0/SD_ILS:574411
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sharma, Neha (Computer scientist), editor. Srivastava, Durgesh (Computer scientist), editor. Sinwar, Deepak, editor.<br/>Preferred Shelf Number R859.7 .A78<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003377818">https://www.taylorfrancis.com/books/9781003377818</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A comprehensive guide to information security management and audit
ent://SD_ILS/0/SD_ILS:581175
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Banoth, Rajkumar, author. Gugulothu, Narsimha, author. Godishala, Aruna Kranthi, author.<br/>Preferred Shelf Number HD38.7<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003322191">https://www.taylorfrancis.com/books/9781003322191</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security threats and challenges facing human life
ent://SD_ILS/0/SD_ILS:589706
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Shekokar, Narendra M., editor. Vasudevan, Hari (Engineer), editor. Durbha, Surya Srinivas, editor. Michalas, Antonis, editor. Nagarhalli, Tatwadarshi P., editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003218555">https://www.taylorfrancis.com/books/9781003218555</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to machine learning with applications in information security
ent://SD_ILS/0/SD_ILS:581034
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Stamp, Mark, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003264873">https://www.taylorfrancis.com/books/9781003264873</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA
ent://SD_ILS/0/SD_ILS:564281
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Imran Tariq, Muhammad. Balas, Valentina Emilia. Tayyaba, Shahzadi.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003107286">https://www.taylorfrancis.com/books/9781003107286</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SECURITY ENGINEERING FOR EMBEDDED AND CYBER -PHYSICAL SYSTEMS
ent://SD_ILS/0/SD_ILS:567522
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Motahhir, Saad. Maleh, Yassine.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003278207">https://www.taylorfrancis.com/books/9781003278207</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure data science : integrating cyber security and data science
ent://SD_ILS/0/SD_ILS:574976
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Thuraisingham, Bhavani M., author. Kantarcioglu, Murat, author. Khan, Latifur, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003081845">https://www.taylorfrancis.com/books/9781003081845</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Strategies for e-service, e-governance, and cyber security : challenges and solutions for efficiency and sustainability
ent://SD_ILS/0/SD_ILS:584675
2026-02-20T20:40:28Z
2026-02-20T20:40:28Z
Author Sahoo, Bhaswati, editor. Behera, Ranbindra Narayana, editor. Samanta, Sasmita Rani, editor. Pattnaik, Prasant Kumar, 1969- editor.<br/>Preferred Shelf Number HF5548.32<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003131175">https://www.taylorfrancis.com/books/9781003131175</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>