Search Results for Security. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2024-12-11T15:03:17Z
UMTS security
ent://SD_ILS/0/SD_ILS:295861
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:271272
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Smith, Richard E.<br/>Preferred Shelf Number QA76.9.A25 S652 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security patch management
ent://SD_ILS/0/SD_ILS:285191
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Nicastro, Felicia M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439825006">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Grid computing security
ent://SD_ILS/0/SD_ILS:248747
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chakrabarti, Anirban.<br/>Preferred Shelf Number QA76.9.C58 C53 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:108620
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Easttom, Chuck.<br/>Preferred Shelf Number QA76.9.A25 E325 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:289155
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless operational security
ent://SD_ILS/0/SD_ILS:254059
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security sourcebook
ent://SD_ILS/0/SD_ILS:94615
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Information security architecture
ent://SD_ILS/0/SD_ILS:285815
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Tudor, Jan Killmeyer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031034">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy vs. Security
ent://SD_ILS/0/SD_ILS:487072
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stalla-Bourdillon, Sophie. author. Phillips, Joshua. author. Ryan, Mark D. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security fundamentals
ent://SD_ILS/0/SD_ILS:342584
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number ONLINE(342584.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security essentials
ent://SD_ILS/0/SD_ILS:287980
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Graham, James (James J.) Howard, Richard, 1959- Olson, Ryan, 1981-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439851265">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9 A25 P45 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:110682
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9.A25 P45 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security for Mobility
ent://SD_ILS/0/SD_ILS:247990
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Mitchell, Chris J., ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Testing code security
ent://SD_ILS/0/SD_ILS:286552
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Van der Linden, Maura A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013795">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IM, instant messaging, security
ent://SD_ILS/0/SD_ILS:253725
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Security Reduction
ent://SD_ILS/0/SD_ILS:399211
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Guo, Fuchun. author. Susilo, Willy. author. (orcid)0000-0002-1562-5105 Mu, Yi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:288451
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:288856
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:284764
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud management and security
ent://SD_ILS/0/SD_ILS:341816
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Abbadi, Imad M., author.<br/>Preferred Shelf Number ONLINE(341816.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft windows security fundamentals
ent://SD_ILS/0/SD_ILS:112183
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Clercq, Jan de, 1968- Grillenmeier, Guido. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft windows security fundamentals
ent://SD_ILS/0/SD_ILS:146346
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Clercq, Jan de, 1968- Grillenmeier, Guido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practical guide to security assessments
ent://SD_ILS/0/SD_ILS:288306
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kairab, Sudhanshu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing homeland security for enterprise IT
ent://SD_ILS/0/SD_ILS:253656
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in intelligence and security informatics
ent://SD_ILS/0/SD_ILS:146055
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Mao, Wenji. Wang, Fei-Yue.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Johnson, Rob (Robert) Merkow, Mark S.<br/>Preferred Shelf Number QA76.9.A25 J64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Medical data security for bioengineers
ent://SD_ILS/0/SD_ILS:482121
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Singh, Butta, 1981- editor. Saini, Barjinder Singh, 1970- editor. Singh, Dilbag, editor. Pandey, Anukul, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security: Power and Technology
ent://SD_ILS/0/SD_ILS:401003
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lehto, Martti. editor. Neittaanmäki, Pekka. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and Network Security Essentials
ent://SD_ILS/0/SD_ILS:402651
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Daimi, Kevin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security frameworks in contemporary electronic government
ent://SD_ILS/0/SD_ILS:481820
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Abassi, Ryma, 1980- editor. Ben Chehida Douss, Aida, 1986- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Proceedings of CSI 2015
ent://SD_ILS/0/SD_ILS:400943
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Bokhari, M. U. editor. Agrawal, Namrata. editor. Saini, Dharmendra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:356403
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number ONLINE(356403.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439895849">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Primer on Client-Side Web Security
ent://SD_ILS/0/SD_ILS:487022
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author De Ryck, Philippe. author. Desmet, Lieven. author. Piessens, Frank. author. Johns, Martin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Cloud Storage Systems
ent://SD_ILS/0/SD_ILS:487858
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Yang, Kan. author. Jia, Xiaohua. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dynamic Secrets in Communication Security
ent://SD_ILS/0/SD_ILS:488222
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Xiao, Sheng. author. Gong, Weibo. author. Towsley, Don. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Online security for the business traveler
ent://SD_ILS/0/SD_ILS:355575
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355575.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for service oriented architectures
ent://SD_ILS/0/SD_ILS:356556
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number ONLINE(356556.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security management a critical thinking approach
ent://SD_ILS/0/SD_ILS:342845
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Preferred Shelf Number ONLINE(342845.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:354232
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Handbook of SCADA/control systems security
ent://SD_ILS/0/SD_ILS:288155
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The complete guide to physical security
ent://SD_ILS/0/SD_ILS:290667
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Baker, Paul, 1958- Benny, Daniel J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Resilience, Security & Risk in Transport
ent://SD_ILS/0/SD_ILS:509892
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author IET, ed.<br/>Preferred Shelf Number XX(509892.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:313473
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stallings, William. Brown, Lawrie<br/>Preferred Shelf Number QA76.9 S73 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security strategy from requirements to reality
ent://SD_ILS/0/SD_ILS:288851
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stackpole, Bill. Oksendahl, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:288879
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Liu, Lei, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:298878
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:288785
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Norman, Thomas L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:286931
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Trinckes, John J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:146369
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Varsalone, Jesse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Vista for IT security professionals
ent://SD_ILS/0/SD_ILS:146242
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Piltzecker, Tony, 1975- Chaffin, Larry.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:149080
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Tyson, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Vista for IT security professionals
ent://SD_ILS/0/SD_ILS:112182
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Piltzecker, Tony, 1975- Chaffin, Larry. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security convergence managing enterprise security risk
ent://SD_ILS/0/SD_ILS:112198
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Tyson, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Enhancing computer security with smart technology
ent://SD_ILS/0/SD_ILS:284793
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Vemuri, V. Rao.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security a strategic approach
ent://SD_ILS/0/SD_ILS:249831
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author LeVeque, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a>
IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:301803
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:109477
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stamp, Mark.<br/>Preferred Shelf Number QA76.9.A25 S69 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Windows Server 2003 security infrastructures
ent://SD_ILS/0/SD_ILS:253837
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Clercq, Jan de, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:314021
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number QA76.9.A25 B56 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:145680
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
HP Nonstop server security a practical handbook
ent://SD_ILS/0/SD_ILS:253849
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Hill, Terri. Alvarado, Ellen. XYPRO Technology Corporation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Windows Windows security secrets & solutions
ent://SD_ILS/0/SD_ILS:293341
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Scambray, Joel. McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:271539
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J3638 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji
ent://SD_ILS/0/SD_ILS:483462
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Carlet, Claude. editor. Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534 Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757 Souidi, El Mamoun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483841
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485283
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Jang, JinSoo. editor. (orcid)0000-0003-2070-2408 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485420
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Mauw, Sjouke. editor. (orcid)0000-0002-2818-4433 Conti, Mauro. editor. (orcid)0000-0002-3612-1934 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-31511-5">https://doi.org/10.1007/978-3-030-31511-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485829
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 Huang, Xinyi. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486352
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941 Toma, Cristian. editor. (orcid)0000-0001-9316-7739 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV
ent://SD_ILS/0/SD_ILS:486379
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:486636
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers
ent://SD_ILS/0/SD_ILS:482709
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810 Horne, Ross. editor. (orcid)0000-0003-0162-1901 Probst, Christian W. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483209
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Liu, Feng. editor. Xu, Jia. editor. Xu, Shouhuai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34637-9">https://doi.org/10.1007/978-3-030-34637-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483391
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814 Antón, Annie. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483504
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Deng, Robert H. editor. (orcid)0000-0003-3491-8146 Gauthier-Umaña, Valérie. editor. (orcid)0000-0003-0909-7091 Ochoa, Martín. editor. (orcid)0000-0002-7816-5775 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:484089
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Vaidya, Jaideep. editor. Zhang, Xiao. editor. Li, Jin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484047
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486706
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Liu, Joseph K. editor. (orcid)0000-0001-6656-6240 Huang, Xinyi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486944
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349 Lampropoulos, Konstantinos. editor. Marín Tordera, Eva. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486956
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X Guo, Fuchun. editor. (orcid)0000-0001-6939-7710 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:487069
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239 Vorobeychik, Yevgeniy. editor. (orcid)0000-0003-2471-5345 Baras, John S. editor. (orcid)0000-0002-4955-8561 Dán, György. editor. (orcid)0000-0002-4876-0223 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483024
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Hamid, Brahim. editor. Gallina, Barbara. editor. (orcid)0000-0002-6952-1053 Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059 Elovici, Yuval. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483099
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131 Lopez, Javier. editor. (orcid)0000-0001-8066-9991 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484061
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484186
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Dolev, Shlomi. editor. Hendler, Danny. editor. Lodha, Sachin. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:484239
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Vaidya, Jaideep. editor. Zhang, Xiao. editor. Li, Jin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-37337-5">https://doi.org/10.1007/978-3-030-37337-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:484518
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Blazy, Olivier. editor. (orcid)0000-0001-6205-8249 Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484523
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Nielson, Flemming. editor. (orcid)0000-0001-7362-6176 Sands, David. editor. (orcid)0000-0001-6221-0503 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484666
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751 Yagi, Takeshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine Learning for Cyber Security Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484720
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chen, Xiaofeng. editor. Huang, Xinyi. editor. Zhang, Jun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30619-9">https://doi.org/10.1007/978-3-030-30619-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484908
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lin, Zhiqiang. editor. Papamanthou, Charalampos. editor. Polychronakis, Michalis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:484909
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sako, Kazue. editor. Schneider, Steve. editor. (orcid)0000-0001-8365-6993 Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:484910
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sako, Kazue. editor. Schneider, Steve. editor. (orcid)0000-0001-8365-6993 Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:485944
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cybenko, George. editor. (orcid)0000-0001-7734-2912 Pym, David. editor. (orcid)0000-0002-6504-5838 Fila, Barbara. editor. (orcid)0000-0002-1824-7621 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486318
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Gritzalis, Stefanos. editor. Weippl, Edgar R. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Anderst-Kotsis, Gabriele. editor. Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-27813-7">https://doi.org/10.1007/978-3-030-27813-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486319
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Goldberg, Ian. editor. Moore, Tyler. editor. (orcid)0000-0002-8771-8191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:486380
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:486576
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sun, Xingming. editor. (orcid)0000-0003-1390-399X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-24265-7">https://doi.org/10.1007/978-3-030-24265-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401487
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Preneel, Bart. editor. (orcid)0000-0003-2005-9651 Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401614
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kim, Howon. editor. Kim, Dong-Chan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402524
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Liu, Peng. editor. Mauw, Sjouke. editor. Stolen, Ketil. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399114
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Bushnell, Linda. editor. (orcid)0000-0002-8751-2409 Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 Başar, Tamer. editor. (orcid)0000-0003-4406-7875 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01554-1">https://doi.org/10.1007/978-3-030-01554-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400077
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Castiglione, Arcangelo. editor. Pop, Florin. editor. Ficco, Massimo. editor. Palmieri, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400111
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Inomata, Atsuo. editor. Yasuda, Kan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400113
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Mouratidis, Haralambos. editor. (orcid)0000-0002-2599-0712 Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400135
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Au, Man Ho. editor. (orcid)0000-0003-2068-9530 Yiu, Siu Ming. editor. Li, Jin. editor. Luo, Xiapu. editor. Wang, Cong. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02744-5">https://doi.org/10.1007/978-3-030-02744-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400194
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chen, Liqun. editor. (orcid)0000-0003-2680-4907 Manulis, Mark. editor. (orcid)0000-0002-1512-9670 Schneider, Steve. editor. (orcid)0000-0001-8365-6993 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400786
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Qing, Sihan. editor. Mitchell, Chris. editor. Chen, Liqun. editor. Liu, Dongmei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:400830
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401682
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006 Kim, Taesoo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401940
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401992
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Yang, Guomin. editor. (orcid)0000-0002-4949-7738 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:402017
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Imine, Abdessamad. editor. Fernandez, José M. editor. (orcid)0000-0001-9836-3595 Marion, Jean-Yves. editor. Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450 Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:402215
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Hancke, Gerhard P. editor. Damiani, Ernesto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399425
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Liu, Feng. editor. Xu, Shouhuai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399445
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cremers, Cas. editor. (orcid)0000-0003-0322-2293 Lehmann, Anja. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399450
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Dinur, Itai. editor. Dolev, Shlomi. editor. Lodha, Sachin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:399699
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lopez, Javier. editor. Zhou, Jianying. editor. Soriano, Miguel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:399718
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lopez, Javier. editor. Zhou, Jianying. editor. Soriano, Miguel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
ent://SD_ILS/0/SD_ILS:399827
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620 Ray, Indrajit. editor. Ray, Indrakshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399957
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Meiklejohn, Sarah. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399972
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Su, Chunhua. editor. Kikuchi, Hiroaki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:399995
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335 Scala, Antonio. editor. (orcid)0000-0002-3414-2686 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400513
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400640
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Bauer, Lujo. editor. Küsters, Ralf. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485513
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Huang, Xinyi. editor. Zhou, Jianying. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485531
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chau, Michael. editor. Chen, Hsinchun. editor. Wang, G. Alan. editor. Wang, Jau-Hwang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485743
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Gritzalis, Dimitris. editor. Kiayias, Aggelos. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485842
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chen, Liqun. editor. Mitchell, Chris. editor. (orcid)0000-0002-6118-0055 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486671
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Saxena, Nitesh. editor. Sadeghi, Ahmad-Reza. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486887
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kim, Yongdae. editor. Lee, Heejo. editor. Perrig, Adrian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488916
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Boureanu, Ioana. editor. Owesarski, Philippe. editor. Vaudenay, Serge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488918
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chow, Sherman S.M. editor. Liu, Joseph K. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488947
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Eckert, Claudia. editor. Katsikas, Sokratis K. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ent://SD_ILS/0/SD_ILS:488956
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488957
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Christianson, Bruce. editor. Malcolm, James. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488984
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Christin, Nicolas. editor. Safavi-Naini, Reihaneh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488986
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lee, Hyang-Sook. editor. Han, Dong-Guk. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488971
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Böhme, Rainer. editor. Brenner, Michael. editor. Moore, Tyler. editor. Smith, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489070
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393 Lioudakis, Georgios. editor. Cuppens-Boulahia, Nora. editor. Foley, Simon. editor. Fitzgerald, William M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489123
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kutylowski, Miroslaw. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:486912
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chakraborty, Rajat Subhra. editor. Matyas, Vashek. editor. Schaumont, Patrick. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487278
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Mu, Yi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:487487
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author De Decker, Bart. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:484564
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Abdalla, Michel. editor. (orcid)0000-0002-2447-4329 De Prisco, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:485793
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chow, Sherman S.M. editor. Camenisch, Jan. editor. Hui, Lucas C.K. editor. Yiu, Siu Ming. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487372
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Yoshida, Maki. editor. Mouri, Koichi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487762
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Danger, Jean Luc. editor. Debbabi, Mourad. editor. Marion, Jean-Yves. editor. Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393 Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
ent://SD_ILS/0/SD_ILS:487789
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kutylowski, Miroslaw. editor. Vaidya, Jaideep. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:487826
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Christianson, Bruce. editor. Malcolm, James. editor. Matyáš, Vashek. editor. Švenda, Petr. editor. Stajano, Frank. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures
ent://SD_ILS/0/SD_ILS:488996
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Aldini, Alessandro. editor. Lopez, Javier. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:489016
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489026
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Mauw, Sjouke. editor. Damsgaard Jensen, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489033
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Poovendran, Radha. editor. (orcid)0000-0003-0269-8097 Saad, Walid. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489038
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cuellar, Jorge. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489091
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Au, Man Ho. editor. Carminati, Barbara. editor. Kuo, C.-C. Jay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:489108
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lin, Dongdai. editor. Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942 Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings
ent://SD_ILS/0/SD_ILS:489420
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Padró, Carles. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489471
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Abadi, Martín. editor. Kremer, Steve. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489541
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Naccache, David. editor. Sauveron, Damien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489545
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Prakash, Atul. editor. Shyamasundar, Rudrapatna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The best damn IT security management book period
ent://SD_ILS/0/SD_ILS:145274
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cunningham, Bryan, JD.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Exploring security in software architecture and design
ent://SD_ILS/0/SD_ILS:481871
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet of Things Security and Data Protection
ent://SD_ILS/0/SD_ILS:485847
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Ziegler, Sébastien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developments in information security and cybernetic wars
ent://SD_ILS/0/SD_ILS:482187
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sarfraz, Muhammad, editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware security : a hands-on learning approach
ent://SD_ILS/0/SD_ILS:460410
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Bhunia, Swarup, author. Tehranipoor, Mohammad H., 1974- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128124772">https://www.sciencedirect.com/science/book/9780128124772</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Physical Layer Security in Wireless Cooperative Networks
ent://SD_ILS/0/SD_ILS:398980
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Wang, Li. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT Convergence and Security 2017 Volume 1
ent://SD_ILS/0/SD_ILS:400069
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kim, Kuinam J. editor. Kim, Hyuncheol. editor. Baek, Nakhoon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT Convergence and Security 2017 Volume 2
ent://SD_ILS/0/SD_ILS:402118
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kim, Kuinam J. editor. Kim, Hyuncheol. editor. Baek, Nakhoon. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security awareness for CEOs and management
ent://SD_ILS/0/SD_ILS:458665
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Willson, David (Lawyer), author. Dalziel, Henry, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DNS security : defending the domain name system
ent://SD_ILS/0/SD_ILS:458935
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Liska, Allan, author. Stowe, Geoffrey, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy and Trust in Cloud Systems
ent://SD_ILS/0/SD_ILS:487946
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Nepal, Surya. editor. Pathan, Mukaddim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:371288
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network and application security fundamentals and practices
ent://SD_ILS/0/SD_ILS:288993
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Ganguly, Debashis. Lahiri, Shibamouli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502451">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:270033
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security strategies in Windows platforms and applications
ent://SD_ILS/0/SD_ILS:271537
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Solomon, Michael.<br/>Preferred Shelf Number QA76.76.O63 S64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Honeypot a new paradigm to information security
ent://SD_ILS/0/SD_ILS:288961
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Joshi, R. C. Sardana, Anjali.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:318966
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Howard, Doug. Prince, Kevin.<br/>Preferred Shelf Number ONLINE(318966.1)<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a>
ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a>
MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:290577
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Bacik, Sandy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IPTV security protecting high-value digital contents
ent://SD_ILS/0/SD_ILS:302654
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Ramirez, David. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470727201">http://dx.doi.org/10.1002/9780470727201</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security design, implementation, measurement, and compliance
ent://SD_ILS/0/SD_ILS:288490
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Layton, Timothy P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:147664
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Zen and the art of information security
ent://SD_ILS/0/SD_ILS:112214
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:110434
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Singhal, Anoop, 1958-<br/>Preferred Shelf Number QA76.9.A25 S563 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Multimedia security technologies for digital rights management
ent://SD_ILS/0/SD_ILS:254554
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Zeng, Wenjun, 1967- Yu, Hong Heather, 1967- Lin, Ching-Yung.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security best practices 205 basic rules
ent://SD_ILS/0/SD_ILS:254779
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stefanek, George L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A practical guide to security engineering and information assurance
ent://SD_ILS/0/SD_ILS:290461
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
ent://SD_ILS/0/SD_ILS:484275
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Trends in the Industrial Internet of Things
ent://SD_ILS/0/SD_ILS:486998
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CSA guide to cloud computing implementing cloud privacy and security
ent://SD_ILS/0/SD_ILS:355449
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Samani, Raj, author. Honan, Brian, author. Reavis, Jim, author. Jirasek, Vladimir, editor. CSA (Organization), issuing body.<br/>Preferred Shelf Number ONLINE(355449.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography
ent://SD_ILS/0/SD_ILS:489032
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Shi, Yun Q. editor. Liu, Feng. editor. Yan, Weiqi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:342886
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author DeFranco, Joanna F., author.<br/>Preferred Shelf Number ONLINE(342886.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information assurance dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:145553
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Qian, Yi, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Amini, Rob. Hunter, Laura E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving drive, detect, defend : a guide to wireless security
ent://SD_ILS/0/SD_ILS:253988
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber law, privacy, and security : concepts, methodologies, tools, and applications
ent://SD_ILS/0/SD_ILS:482239
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Security Properties on Commodity Computing Platforms The uber eXtensible Micro-Hypervisor Framework
ent://SD_ILS/0/SD_ILS:482868
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Vasudevan, Amit. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25049-2">https://doi.org/10.1007/978-3-030-25049-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:482982
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Zhang, Huanguo. editor. Zhao, Bo. editor. Yan, Fei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483496
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Li, Jin. editor. Liu, Zheli. editor. Peng, Hao. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483823
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Thampi, Sabu M. editor. Madria, Sanjay. editor. Wang, Guojun. editor. (orcid)0000-0001-9875-4182 Rawat, Danda B. editor. Alcaraz Calero, Jose M. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:484330
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chen, Songqing. editor. (orcid)0000-0003-4650-7125 Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336 Fu, Xinwen. editor. (orcid)0000-0003-2391-7789 Lou, Wenjing. editor. Mohaisen, Aziz. editor. (orcid)0000-0003-3227-2505<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-37228-6">https://doi.org/10.1007/978-3-030-37228-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Cyber Security: Principles, Techniques, and Applications
ent://SD_ILS/0/SD_ILS:484493
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Li, Kuan-Ching. editor. Chen, Xiaofeng. editor. Susilo, Willy. editor. (orcid)0000-0002-1562-5105 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy and Trust in the IoT Environment
ent://SD_ILS/0/SD_ILS:485230
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Mahmood, Zaigham. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-18075-1">https://doi.org/10.1007/978-3-030-18075-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Quality in Cyber-Physical Systems Engineering With Forewords by Robert M. Lee and Tom Gilb
ent://SD_ILS/0/SD_ILS:485380
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Biffl, Stefan. editor. (orcid)0000-0002-3413-7780 Eckhart, Matthias. editor. Lüder, Arndt. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25312-7">https://doi.org/10.1007/978-3-030-25312-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:486190
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chen, Songqing. editor. (orcid)0000-0003-4650-7125 Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336 Fu, Xinwen. editor. (orcid)0000-0003-2391-7789 Lou, Wenjing. editor. Mohaisen, Aziz. editor. (orcid)0000-0003-3227-2505<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-37231-6">https://doi.org/10.1007/978-3-030-37231-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Data Science, Cyber Security and IT Applications First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:486449
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Alfaries, Auhood. editor. Mengash, Hanan. editor. Yasar, Ansar. editor. (orcid)0000-0002-1542-2658 Shakshuki, Elhadi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-36368-0">https://doi.org/10.1007/978-3-030-36368-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global cyber security labor shortage and international business risk
ent://SD_ILS/0/SD_ILS:481810
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced methodologies and technologies in system security, information privacy, and forensics
ent://SD_ILS/0/SD_ILS:482009
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Khosrow-Pour, Mehdi, 1951- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network security and its impact on business strategy
ent://SD_ILS/0/SD_ILS:482213
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Oncioiu, Ionica, 1972- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483112
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Nandi, Sukumar. editor. Jinwala, Devesh. editor. Singh, Virendra. editor. Laxmi, Vijay. editor. Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:483447
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Mori, Paolo. editor. (orcid)0000-0002-6618-0388 Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:483576
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944 Subramaniyaswamy, V. editor. Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X Zhang, Leo. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday
ent://SD_ILS/0/SD_ILS:486859
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Alvim, Mário S. editor. Chatzikokolakis, Kostas. editor. Olarte, Carlos. editor. Valencia, Frank. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The NICE Cyber Security Framework Cyber Security Intelligence and Analytics
ent://SD_ILS/0/SD_ILS:484062
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Alsmadi, Izzat. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02360-7">https://doi.org/10.1007/978-3-030-02360-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Data Storage Aspect in Cloud Computing
ent://SD_ILS/0/SD_ILS:484576
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Deshpande, Prachi S. author. Sharma, Subhash C. author. Peddoju, Sateesh K. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-6089-3">https://doi.org/10.1007/978-981-13-6089-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXXIII 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484606
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Foley, Simon N. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22479-0">https://doi.org/10.1007/978-3-030-22479-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484867
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331 Troubitsyna, Elena. editor. Gashi, Ilir. editor. Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443 Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things
ent://SD_ILS/0/SD_ILS:484904
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Hudson, Florence D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485997
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Dhillon, Gurpreet. editor. Karlsson, Fredrik. editor. Hedström, Karin. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:486019
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Shen, Bazhong. editor. Wang, Baocang. editor. (orcid)0000-0002-2554-4464 Han, Jinguang. editor. (orcid)0000-0002-4993-9452 Yu, Yong. editor. (orcid)0000-0003-0667-077X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486817
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Yun, Xiaochun. editor. Wen, Weiping. editor. Lang, Bo. editor. Yan, Hanbing. editor. Ding, Li. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-6621-5">https://doi.org/10.1007/978-981-13-6621-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Medical Imaging and its Security in Telemedicine Applications
ent://SD_ILS/0/SD_ILS:487428
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Thanki, Rohit. author. (orcid)0000-0002-0645-6266 Borra, Surekha. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93311-5">https://doi.org/10.1007/978-3-319-93311-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401486
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Mori, Paolo. editor. Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Camp, Olivier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
ent://SD_ILS/0/SD_ILS:401907
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Petrenko, Sergei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:399121
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Ganapathi, Geetha. editor. Subramaniam, Arumugam. editor. Graña, Manuel. editor. Balusamy, Suresh. editor. Natarajan, Rajamanickam. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399145
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Li, Fagen. editor. (orcid)0000-0001-6289-1265 Takagi, Tsuyoshi. editor. Xu, Chunxiang. editor. Zhang, Xiaosong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless Communications under Hostile Jamming: Security and Efficiency
ent://SD_ILS/0/SD_ILS:399157
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Li, Tongtong. author. Song, Tianlong. author. Liang, Yuan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I
ent://SD_ILS/0/SD_ILS:399285
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sun, Xingming. editor. (orcid)0000-0001-7982-726X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00006-6">https://doi.org/10.1007/978-3-030-00006-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:399473
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Fortino, Giancarlo. editor. Palau, Carlos E. editor. Guerrieri, Antonio. editor. Cuppens, Nora. editor. Cuppens, Frédéric. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV
ent://SD_ILS/0/SD_ILS:399710
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sun, Xingming. editor. (orcid)0000-0001-7982-726X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III
ent://SD_ILS/0/SD_ILS:400071
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sun, Xingming. editor. (orcid)0000-0001-7982-726X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00012-7">https://doi.org/10.1007/978-3-030-00012-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Computing and Systems for Security Volume Six
ent://SD_ILS/0/SD_ILS:400080
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chaki, Rituparna. editor. Cortesi, Agostino. editor. Saeed, Khalid. editor. Chaki, Nabendu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:400185
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Beyah, Raheem. editor. Chang, Bing. editor. Li, Yingjiu. editor. Zhu, Sencun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:400221
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Beyah, Raheem. editor. Chang, Bing. editor. Li, Yingjiu. editor. Zhu, Sencun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II
ent://SD_ILS/0/SD_ILS:400367
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sun, Xingming. editor. (orcid)0000-0001-7982-726X Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X Bertino, Elisa. editor. (orcid)0000-0002-4029-7051 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00009-7">https://doi.org/10.1007/978-3-030-00009-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400376
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chen, Qingfeng. editor. Wu, Jia. editor. Zhang, Shichao. editor. Yuan, Changan. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017
ent://SD_ILS/0/SD_ILS:400671
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Yang, Xin-She. editor. Nagar, Atulya K. editor. Joshi, Amit. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401000
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author You, Ilsun. editor. Leu, Fang-Yie. editor. Chen, Hsing-Chung. editor. Kotenko, Igor. editor. (orcid)0000-0001-6859-7120 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401734
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. Zhou, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Information Security A Competency-Based Education Course
ent://SD_ILS/0/SD_ILS:401941
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Alsmadi, Izzat. author. Burdwell, Robert. author. Aleroud , Ahmed. author. Wahbeh, Abdallah. author. Al-Qudah, Mahmoud. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Women in Security Changing the Face of Technology and Innovation
ent://SD_ILS/0/SD_ILS:402274
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Christofferson, Debra A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:402675
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kerschbaum, Florian. editor. Paraboschi, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Data and Security Engineering 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399404
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Dang, Tran Khanh. editor. Küng, Josef. editor. Wagner, Roland. editor. Thoai, Nam. editor. Takizawa, Makoto. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03192-3">https://doi.org/10.1007/978-3-030-03192-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security
ent://SD_ILS/0/SD_ILS:399520
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Baldi, Marco. editor. (orcid)0000-0002-8754-5526 Quaglia, Elizabeth A. editor. Tomasin, Stefano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications
ent://SD_ILS/0/SD_ILS:400016
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Rao, Nageswara S.V. editor. Brooks, Richard R. editor. Wu, Chase Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400045
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X Kutyłowski, Mirosław. editor. (orcid)0000-0003-3192-2430 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, Västerås, Sweden, September 19-21, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400344
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Gallina, Barbara. editor. (orcid)0000-0002-6952-1053 Skavhaug, Amund. editor. Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
ent://SD_ILS/0/SD_ILS:400508
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Wan, Jiafu. editor. Lin, Kai. editor. Zeng, Delu. editor. Li, Jin. editor. Xiang, Yang. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400846
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
ent://SD_ILS/0/SD_ILS:400949
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lin, Xiaodong. editor. Ghorbani, Ali. editor. Ren, Kui. editor. Zhu, Sencun. editor. Zhang, Aiqing. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced Computing and Systems for Security Volume Five
ent://SD_ILS/0/SD_ILS:401086
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Chaki, Rituparna. editor. Cortesi, Agostino. editor. Saeed, Khalid. editor. Chaki, Nabendu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security science : measuring the vulnerability to data compromises
ent://SD_ILS/0/SD_ILS:458968
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Young, Carl S., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security analytics finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:355388
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Talabis, Mark, author. McPherson, Robert, author. Miyamoto, I, author. Martin, Jason L., author.<br/>Preferred Shelf Number ONLINE(355388.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Unauthorized access the crisis in online privacy and security
ent://SD_ILS/0/SD_ILS:285321
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sloan, Robert H. Warner, Richard, 1946-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439830147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:485732
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Felber, Pascal. editor. Garg, Vijay. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Hardening An Automated Approach to Improving Network Security
ent://SD_ILS/0/SD_ILS:486885
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Wang, Lingyu. author. Albanese, Massimiliano. author. Jajodia, Sushil. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyberpatterns Unifying Design Patterns with Security and Attack Patterns
ent://SD_ILS/0/SD_ILS:488814
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Blackwell, Clive. editor. Zhu, Hong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04447-7">https://doi.org/10.1007/978-3-319-04447-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013
ent://SD_ILS/0/SD_ILS:488884
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Krishnan, G. Sai Sundara. editor. Anitha, R. editor. Lekshmi, R. S. editor. Kumar, M. Senthil. editor. Bonato, Anthony. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:488930
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488960
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sperotto, Anna. editor. Doyen, Guillaume. editor. Latré, Steven. editor. Charalambides, Marinos. editor. Stiller, Burkhard. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489201
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cuppens-Boulahia, Nora. editor. Cuppens, Frederic. editor. Jajodia, Sushil. editor. Abou El Kalam, Anas. editor. Sans, Thierry. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:486701
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Sideridis, Alexander B. editor. Kardasiadou, Zoe. editor. Yialouris, Constantine P. editor. Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
ent://SD_ILS/0/SD_ILS:487178
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Hassanien, Aboul Ella. editor. Kim, Tai-Hoon. editor. Kacprzyk, Janusz. editor. Awad, Ali Ismail. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43616-5">https://doi.org/10.1007/978-3-662-43616-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference
ent://SD_ILS/0/SD_ILS:487216
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Reimer, Helmut. editor. Pohlmann, Norbert. editor. Schneider, Wolfgang. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Visual Cryptography for Image Processing and Security Theory, Methods, and Applications
ent://SD_ILS/0/SD_ILS:487455
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Liu, Feng. author. Yan, Wei Qi. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488011
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Batten, Lynn. editor. Li, Gang. editor. (orcid)0000-0003-1583-641X Niu, Wenjia. editor. Warren, Matthew. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:487966
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Martinez Perez, Gregorio. editor. Thampi, Sabu M. editor. Ko, Ryan. editor. Shu, Lei. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems
ent://SD_ILS/0/SD_ILS:355352
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Knapp, Eric D. Langill, Joel Thomas.<br/>Preferred Shelf Number ONLINE(355352.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:355829
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:356681
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number ONLINE(356681.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:488089
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Cleary, Frances. editor. Felici, Massimo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12574-9">https://doi.org/10.1007/978-3-319-12574-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488136
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Kotulski, Zbigniew. editor. Ksiezopolski, Bogdan. editor. Mazur, Katarzyna. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:488140
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Lloret Mauri, Jaime. editor. Thampi, Sabu M. editor. Rawat, Danda B. editor. Jin, Di. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-44966-0">https://doi.org/10.1007/978-3-662-44966-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:489055
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Teufel, Stephanie. editor. A Min, Tjoa. editor. You, Illsun. editor. Weippl, Edgar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489103
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589 Wagner, Roland. editor. Neuhold, Erich J. editor. Takizawa, Makoto. editor. Küng, Josef. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489506
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Atluri, Vijay. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for wireless sensor networks using identity-based cryptography
ent://SD_ILS/0/SD_ILS:286252
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Patil, Harsh Kupwade. Szygenda, Stephen A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:288173
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Williams, Barry L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data security, data mining and data management : technologies and challenges
ent://SD_ILS/0/SD_ILS:280914
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author O'Byrne, Serge, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
ent://SD_ILS/0/SD_ILS:146917
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PRAGMATIC security metrics applying metametrics to information security
ent://SD_ILS/0/SD_ILS:289974
2024-12-11T15:03:17Z
2024-12-11T15:03:17Z
Author Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>