Search Results for Security. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-11-07T19:41:24Z UMTS security ent://SD_ILS/0/SD_ILS:295861 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Niemi, Valtteri.&#160;Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a> Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a> John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kissell, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elementary information security ent://SD_ILS/0/SD_ILS:271272 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Smith, Richard E.<br/>Preferred Shelf Number&#160;QA76.9.A25 S652 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security patch management ent://SD_ILS/0/SD_ILS:285191 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Nicastro, Felicia M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439825006">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid computing security ent://SD_ILS/0/SD_ILS:248747 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chakrabarti, Anirban.<br/>Preferred Shelf Number&#160;QA76.9.C58 C53 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Easttom, Chuck.<br/>Preferred Shelf Number&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:289155 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Peltier, Thomas R.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:254059 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Caldwell, Wilma, ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security architecture ent://SD_ILS/0/SD_ILS:285815 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Tudor, Jan Killmeyer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031034">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:342584 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;ONLINE(342584.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:487072 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stalla-Bourdillon, Sophie. author.&#160;Phillips, Joshua. author.&#160;Ryan, Mark D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security essentials ent://SD_ILS/0/SD_ILS:287980 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Graham, James (James J.)&#160;Howard, Richard, 1959-&#160;Olson, Ryan, 1981-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439851265">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:313297 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA76.9 A25 P45 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security in computing ent://SD_ILS/0/SD_ILS:110682 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number&#160;QA76.9.A25 P45 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security for Mobility ent://SD_ILS/0/SD_ILS:247990 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Mitchell, Chris J., ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Testing code security ent://SD_ILS/0/SD_ILS:286552 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Van der Linden, Maura A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013795">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:253725 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:399211 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Guo, Fuchun. author.&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Mu, Yi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:288856 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:284764 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:341816 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Abbadi, Imad M., author.<br/>Preferred Shelf Number&#160;ONLINE(341816.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a> <a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:112183 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:146346 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Clercq, Jan de, 1968-&#160;Grillenmeier, Guido.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:288306 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kairab, Sudhanshu.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:253656 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Erbschloe, Michael.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:146055 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Mao, Wenji.&#160;Wang, Fei-Yue.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:271534 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Johnson, Rob (Robert)&#160;Merkow, Mark S.<br/>Preferred Shelf Number&#160;QA76.9.A25 J64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Medical data security for bioengineers ent://SD_ILS/0/SD_ILS:482121 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Singh, Butta, 1981- editor.&#160;Saini, Barjinder Singh, 1970- editor.&#160;Singh, Dilbag, editor.&#160;Pandey, Anukul, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7952-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:400943 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Bokhari, M. U. editor.&#160;Agrawal, Namrata. editor.&#160;Saini, Dharmendra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:402651 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Daimi, Kevin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:401003 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security frameworks in contemporary electronic government ent://SD_ILS/0/SD_ILS:481820 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Abassi, Ryma, 1980- editor.&#160;Ben Chehida Douss, Aida, 1986- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5984-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:459146 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Andress, Jason, author.&#160;Leary, Mark, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:356403 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Mukhopadhyay, Debdeep, author.&#160;Subhra, Rajat, author.<br/>Preferred Shelf Number&#160;ONLINE(356403.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439895849">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security management a critical thinking approach ent://SD_ILS/0/SD_ILS:342845 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Land, Michael (Industrial engineer), author.&#160;Ricks, Truett A., author.&#160;Ricks, Bob, author.<br/>Preferred Shelf Number&#160;ONLINE(342845.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:355575 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Gonzalez, Deborah, author.<br/>Preferred Shelf Number&#160;ONLINE(355575.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:356556 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number&#160;ONLINE(356556.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:487022 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;De Ryck, Philippe. author.&#160;Desmet, Lieven. author.&#160;Piessens, Frank. author.&#160;Johns, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12226-7">https://doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:487858 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:488222 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Xiao, Sheng. author.&#160;Gong, Weibo. author.&#160;Towsley, Don. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:288155 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:290667 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Baker, Paul, 1958-&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience, Security &amp; Risk in Transport ent://SD_ILS/0/SD_ILS:509892 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;IET, ed.<br/>Preferred Shelf Number&#160;XX(509892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:313473 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stallings, William.&#160;Brown, Lawrie<br/>Preferred Shelf Number&#160;QA76.9 S73 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:298878 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategy from requirements to reality ent://SD_ILS/0/SD_ILS:288851 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stackpole, Bill.&#160;Oksendahl, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:288879 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Liu, Lei, 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:286931 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Trinckes, John J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:288785 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Norman, Thomas L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Moeller, Robert R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:146369 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Varsalone, Jesse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:112198 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Tyson, Dave.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:112182 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Piltzecker, Tony, 1975-&#160;Chaffin, Larry.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:146242 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Piltzecker, Tony, 1975-&#160;Chaffin, Larry.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:149080 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Tyson, Dave.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:109477 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;QA76.9.A25 S69 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:284793 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:301803 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a> John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security a strategic approach ent://SD_ILS/0/SD_ILS:249831 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;LeVeque, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138</a> IEEE Xplore <a href="http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138">http://ieeexplore.ieee.org/servlet/opac?bknumber=5989138</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:253837 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Clercq, Jan de, 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:314021 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Bishop, Matt (Matthew A.)<br/>Preferred Shelf Number&#160;QA76.9.A25 B56 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:145680 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Winkler, Ira.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HP Nonstop server security a practical handbook ent://SD_ILS/0/SD_ILS:253849 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Hill, Terri.&#160;Alvarado, Ellen.&#160;XYPRO Technology Corporation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application security a beginner's guide ent://SD_ILS/0/SD_ILS:293241 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sullivan, Bryan, 1974-&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:271539 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Jang, Michael H.<br/>Preferred Shelf Number&#160;QA76.76.O63 J3638 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking exposed wireless wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293300 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cache, Johnny.&#160;Wright, Joshua.&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Windows Windows security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293341 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Scambray, Joel.&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers ent://SD_ILS/0/SD_ILS:482709 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810&#160;Horne, Ross. editor. (orcid)0000-0003-0162-1901&#160;Probst, Christian W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483099 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131&#160;Lopez, Javier. editor. (orcid)0000-0001-8066-9991&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483209 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Liu, Feng. editor.&#160;Xu, Jia. editor.&#160;Xu, Shouhuai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34637-9">https://doi.org/10.1007/978-3-030-34637-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483391 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814&#160;Ant&oacute;n, Annie. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 13th International Conference, NSS 2019, Sapporo, Japan, December 15&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486706 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Liu, Joseph K. editor. (orcid)0000-0001-6656-6240&#160;Huang, Xinyi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36938-5">https://doi.org/10.1007/978-3-030-36938-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486944 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349&#160;Lampropoulos, Konstantinos. editor.&#160;Mar&iacute;n Tordera, Eva. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1&ndash;3, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484239 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Vaidya, Jaideep. editor.&#160;Zhang, Xiao. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-37337-5">https://doi.org/10.1007/978-3-030-37337-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484518 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249&#160;Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6&ndash;11, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484523 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Nielson, Flemming. editor. (orcid)0000-0001-7362-6176&#160;Sands, David. editor. (orcid)0000-0001-6221-0503&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security Second International Conference, ML4CS 2019, Xi&rsquo;an, China, September 19-21, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484720 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Zhang, Jun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30619-9">https://doi.org/10.1007/978-3-030-30619-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23&ndash;25, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485283 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006&#160;Jang, JinSoo. editor. (orcid)0000-0003-2070-2408&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485420 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Mauw, Sjouke. editor. (orcid)0000-0002-2818-4433&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31511-5">https://doi.org/10.1007/978-3-030-31511-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:486380 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24271-8">https://doi.org/10.1007/978-3-030-24271-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019, Linz, Austria, August 26&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486318 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Gritzalis, Stefanos. editor.&#160;Weippl, Edgar R. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Anderst-Kotsis, Gabriele. editor.&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-27813-7">https://doi.org/10.1007/978-3-030-27813-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18&ndash;22, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486319 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Goldberg, Ian. editor.&#160;Moore, Tyler. editor. (orcid)0000-0002-8771-8191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:486379 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486636 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 &ndash; November 1, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487069 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239&#160;Vorobeychik, Yevgeniy. editor. (orcid)0000-0003-2471-5345&#160;Baras, John S. editor. (orcid)0000-0002-4955-8561&#160;D&aacute;n, Gy&ouml;rgy. editor. (orcid)0000-0002-4876-0223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes, Cryptology and Information Security Third International Conference, C2SI 2019, Rabat, Morocco, April 22&ndash;24, 2019, Proceedings - In Honor of Said El Hajji ent://SD_ILS/0/SD_ILS:483462 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Carlet, Claude. editor.&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534&#160;Nitaj, Abderrahmane. editor. (orcid)0000-0002-0372-1757&#160;Souidi, El Mamoun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16458-4">https://doi.org/10.1007/978-3-030-16458-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2018 21st International Conference, Seoul, South Korea, November 28&ndash;30, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483841 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484061 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890&#160;&#381;utautait&#279;, Inga. editor. (orcid)0000-0002-6073-2823&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1&ndash;3, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484089 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Vaidya, Jaideep. editor.&#160;Zhang, Xiao. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484666 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751&#160;Yagi, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484908 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lin, Zhiqiang. editor.&#160;Papamanthou, Charalampos. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23&ndash;27, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484909 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sako, Kazue. editor.&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23&ndash;27, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484910 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sako, Kazue. editor.&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;Ryan, Peter Y. A. editor. (orcid)0000-0002-1677-9034&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485944 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cybenko, George. editor. (orcid)0000-0001-7734-2912&#160;Pym, David. editor. (orcid)0000-0002-6504-5838&#160;Fila, Barbara. editor. (orcid)0000-0002-1824-7621&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8&ndash;9, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486352 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941&#160;Toma, Cristian. editor. (orcid)0000-0001-9316-7739&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483024 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Hamid, Brahim. editor.&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Shabtai, Asaf. editor. (orcid)0000-0003-0630-4059&#160;Elovici, Yuval. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483504 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146&#160;Gauthier-Uma&ntilde;a, Val&eacute;rie. editor. (orcid)0000-0003-0909-7091&#160;Ochoa, Mart&iacute;n. editor. (orcid)0000-0002-7816-5775&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485829 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:486576 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24265-7">https://doi.org/10.1007/978-3-030-24265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3&ndash;5, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486956 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399445 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cremers, Cas. editor. (orcid)0000-0003-0322-2293&#160;Lehmann, Anja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399450 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Dinur, Itai. editor.&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400077 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Castiglione, Arcangelo. editor.&#160;Pop, Florin. editor.&#160;Ficco, Massimo. editor.&#160;Palmieri, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:399827 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Ray, Indrajit. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400135 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Au, Man Ho. editor. (orcid)0000-0003-2068-9530&#160;Yiu, Siu Ming. editor.&#160;Li, Jin. editor.&#160;Luo, Xiapu. editor.&#160;Wang, Cong. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02744-5">https://doi.org/10.1007/978-3-030-02744-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400640 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Bauer, Lujo. editor.&#160;K&uuml;sters, Ralf. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400786 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Qing, Sihan. editor.&#160;Mitchell, Chris. editor.&#160;Chen, Liqun. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400830 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chen, Xiaofeng. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399114 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Bushnell, Linda. editor. (orcid)0000-0002-8751-2409&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Ba&#351;ar, Tamer. editor. (orcid)0000-0003-4406-7875&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01554-1">https://doi.org/10.1007/978-3-030-01554-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399425 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Liu, Feng. editor.&#160;Xu, Shouhuai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399699 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399718 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401614 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kim, Howon. editor.&#160;Kim, Dong-Chan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401682 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006&#160;Kim, Taesoo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401992 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Yang, Guomin. editor. (orcid)0000-0002-4949-7738&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402017 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Imine, Abdessamad. editor.&#160;Fernandez, Jos&eacute; M. editor. (orcid)0000-0001-9836-3595&#160;Marion, Jean-Yves. editor.&#160;Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402215 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Hancke, Gerhard P. editor.&#160;Damiani, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400111 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Inomata, Atsuo. editor.&#160;Yasuda, Kan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400113 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Mouratidis, Haralambos. editor. (orcid)0000-0002-2599-0712&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399995 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335&#160;Scala, Antonio. editor. (orcid)0000-0002-3414-2686&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400194 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Manulis, Mark. editor. (orcid)0000-0002-1512-9670&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Cura&ccedil;ao, February 26 &ndash; March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399957 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Meiklejohn, Sarah. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400513 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401940 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Kalloniatis, Christos. editor. (orcid)0000-0002-8844-2596<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402524 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Liu, Peng. editor.&#160;Mauw, Sjouke. editor.&#160;Stolen, Ketil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399972 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Su, Chunhua. editor.&#160;Kikuchi, Hiroaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488947 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Eckert, Claudia. editor.&#160;Katsikas, Sokratis K. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488957 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489471 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Kremer, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486671 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Saxena, Nitesh. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487278 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487762 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Danger, Jean Luc. editor.&#160;Debbabi, Mourad. editor.&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489070 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Lioudakis, Georgios. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Foley, Simon. editor.&#160;Fitzgerald, William M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54568-9">https://doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489545 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485531 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chau, Michael. editor.&#160;Chen, Hsinchun. editor.&#160;Wang, G. Alan. editor.&#160;Wang, Jau-Hwang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06677-6">https://doi.org/10.1007/978-3-319-06677-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485793 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chow, Sherman S.M. editor.&#160;Camenisch, Jan. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485743 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Gritzalis, Dimitris. editor.&#160;Kiayias, Aggelos. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485842 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chen, Liqun. editor.&#160;Mitchell, Chris. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486887 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487826 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489091 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Au, Man Ho. editor.&#160;Carminati, Barbara. editor.&#160;Kuo, C.-C. Jay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489033 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;Saad, Walid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12601-2">https://doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489038 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cuellar, Jorge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10329-7">https://doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The best damn IT security management book period ent://SD_ILS/0/SD_ILS:145274 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cunningham, Bryan, JD.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Exploring security in software architecture and design ent://SD_ILS/0/SD_ILS:481871 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Felderer, Michael, editor.&#160;Scandariato, Riccardo, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware security : a hands-on learning approach ent://SD_ILS/0/SD_ILS:460410 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Bhunia, Swarup, author.&#160;Tehranipoor, Mohammad H., 1974- author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128124772">https://www.sciencedirect.com/science/book/9780128124772</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developments in information security and cybernetic wars ent://SD_ILS/0/SD_ILS:482187 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sarfraz, Muhammad, editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8304-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things Security and Data Protection ent://SD_ILS/0/SD_ILS:485847 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Ziegler, S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:400069 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Layer Security in Wireless Cooperative Networks ent://SD_ILS/0/SD_ILS:398980 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Wang, Li. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:402118 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:458665 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Willson, David (Lawyer), author.&#160;Dalziel, Henry, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNS security : defending the domain name system ent://SD_ILS/0/SD_ILS:458935 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Liska, Allan, author.&#160;Stowe, Geoffrey, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:487946 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Nepal, Surya. editor.&#160;Pathan, Mukaddim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Preferred Shelf Number&#160;TK5105.59 M48 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:288993 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Ganguly, Debashis.&#160;Lahiri, Shibamouli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502451">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Honeypot a new paradigm to information security ent://SD_ILS/0/SD_ILS:288961 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Joshi, R. C.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategies in Windows platforms and applications ent://SD_ILS/0/SD_ILS:271537 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Solomon, Michael.<br/>Preferred Shelf Number&#160;QA76.76.O63 S64 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:318966 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Howard, Doug.&#160;Prince, Kevin.<br/>Preferred Shelf Number&#160;ONLINE(318966.1)<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a> ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a> MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IPTV security protecting high-value digital contents ent://SD_ILS/0/SD_ILS:302654 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Ramirez, David.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470727201">http://dx.doi.org/10.1002/9780470727201</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:290577 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Bacik, Sandy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Singhal, Anoop, 1958-<br/>Preferred Shelf Number&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:112214 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Winkler, Ira.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:306464 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cross, Michael, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Layton, Timothy P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:147664 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cross, Michael, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:254554 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Zeng, Wenjun, 1967-&#160;Yu, Hong Heather, 1967-&#160;Lin, Ching-Yung.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security best practices 205 basic rules ent://SD_ILS/0/SD_ILS:254779 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stefanek, George L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:290461 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Herrmann, Debra S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Trends in the Industrial Internet of Things ent://SD_ILS/0/SD_ILS:486998 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CSA guide to cloud computing implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:355449 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Samani, Raj, author.&#160;Honan, Brian, author.&#160;Reavis, Jim, author.&#160;Jirasek, Vladimir, editor.&#160;CSA (Organization), issuing body.<br/>Preferred Shelf Number&#160;ONLINE(355449.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201255">http://www.sciencedirect.com/science/book/9780124201255</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Griffor, Edward R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:342886 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;DeFranco, Joanna F., author.<br/>Preferred Shelf Number&#160;ONLINE(342886.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed web applications web application security secrets and solutions ent://SD_ILS/0/SD_ILS:293277 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Scambray, Joel.&#160;Liu, Vincent.&#160;Sima, Caleb.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 24 deadly sins of software security programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:293319 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Howard, Michael, 1965-&#160;LeBlanc, David, 1960-&#160;Viega, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:145553 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Qian, Yi, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:253670 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Amini, Rob.&#160;Hunter, Laura E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> WarDriving drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:253988 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Hurley, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global cyber security labor shortage and international business risk ent://SD_ILS/0/SD_ILS:481810 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Christiansen, Bryan, 1960- editor.&#160;Piekarz, Agnieszka, 1990- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483112 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Nandi, Sukumar. editor.&#160;Jinwala, Devesh. editor.&#160;Singh, Virendra. editor.&#160;Laxmi, Vijay. editor.&#160;Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14&ndash;16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486817 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Yun, Xiaochun. editor.&#160;Wen, Weiping. editor.&#160;Lang, Bo. editor.&#160;Yan, Hanbing. editor.&#160;Ding, Li. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-6621-5">https://doi.org/10.1007/978-981-13-6621-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The NICE Cyber Security Framework Cyber Security Intelligence and Analytics ent://SD_ILS/0/SD_ILS:484062 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Alsmadi, Izzat. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02360-7">https://doi.org/10.1007/978-3-030-02360-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484330 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chen, Songqing. editor. (orcid)0000-0003-4650-7125&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336&#160;Fu, Xinwen. editor. (orcid)0000-0003-2391-7789&#160;Lou, Wenjing. editor.&#160;Mohaisen, Aziz. editor. (orcid)0000-0003-3227-2505<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-37228-6">https://doi.org/10.1007/978-3-030-37228-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cyber Security: Principles, Techniques, and Applications ent://SD_ILS/0/SD_ILS:484493 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Li, Kuan-Ching. editor.&#160;Chen, Xiaofeng. editor.&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1483-4">https://doi.org/10.1007/978-981-13-1483-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Data Storage Aspect in Cloud Computing ent://SD_ILS/0/SD_ILS:484576 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Deshpande, Prachi S. author.&#160;Sharma, Subhash C. author.&#160;Peddoju, Sateesh K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-6089-3">https://doi.org/10.1007/978-981-13-6089-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy and Trust in the IoT Environment ent://SD_ILS/0/SD_ILS:485230 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18075-1">https://doi.org/10.1007/978-3-030-18075-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Security Properties on Commodity Computing Platforms The uber eXtensible Micro-Hypervisor Framework ent://SD_ILS/0/SD_ILS:482868 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Vasudevan, Amit. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25049-2">https://doi.org/10.1007/978-3-030-25049-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483447 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Mori, Paolo. editor. (orcid)0000-0002-6618-0388&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Camp, Olivier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19&ndash;22, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483823 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Thampi, Sabu M. editor.&#160;Madria, Sanjay. editor.&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Rawat, Danda B. editor.&#160;Alcaraz Calero, Jose M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXXIII 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484606 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Foley, Simon N. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-22479-0">https://doi.org/10.1007/978-3-030-22479-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484867 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Romanovsky, Alexander. editor. (orcid)0000-0002-4076-3331&#160;Troubitsyna, Elena. editor.&#160;Gashi, Ilir. editor.&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26250-1">https://doi.org/10.1007/978-3-030-26250-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things ent://SD_ILS/0/SD_ILS:484904 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Hudson, Florence D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Quality in Cyber-Physical Systems Engineering With Forewords by Robert M. Lee and Tom Gilb ent://SD_ILS/0/SD_ILS:485380 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Biffl, Stefan. editor. (orcid)0000-0002-3413-7780&#160;Eckhart, Matthias. editor.&#160;L&uuml;der, Arndt. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25312-7">https://doi.org/10.1007/978-3-030-25312-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485997 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Dhillon, Gurpreet. editor.&#160;Karlsson, Fredrik. editor.&#160;Hedstr&ouml;m, Karin. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486019 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Shen, Bazhong. editor.&#160;Wang, Baocang. editor. (orcid)0000-0002-2554-4464&#160;Han, Jinguang. editor. (orcid)0000-0002-4993-9452&#160;Yu, Yong. editor. (orcid)0000-0003-0667-077X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:482982 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Zhang, Huanguo. editor.&#160;Zhao, Bo. editor.&#160;Yan, Fei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-5913-2">https://doi.org/10.1007/978-981-13-5913-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13&ndash;14, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483496 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Li, Jin. editor.&#160;Liu, Zheli. editor.&#160;Peng, Hao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23&ndash;25, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:486190 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chen, Songqing. editor. (orcid)0000-0003-4650-7125&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336&#160;Fu, Xinwen. editor. (orcid)0000-0003-2391-7789&#160;Lou, Wenjing. editor.&#160;Mohaisen, Aziz. editor. (orcid)0000-0003-3227-2505<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-37231-6">https://doi.org/10.1007/978-3-030-37231-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Data Science, Cyber Security and IT Applications First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:486449 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Alfaries, Auhood. editor.&#160;Mengash, Hanan. editor.&#160;Yasar, Ansar. editor. (orcid)0000-0002-1542-2658&#160;Shakshuki, Elhadi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36368-0">https://doi.org/10.1007/978-3-030-36368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday ent://SD_ILS/0/SD_ILS:486859 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Alvim, M&aacute;rio S. editor.&#160;Chatzikokolakis, Kostas. editor.&#160;Olarte, Carlos. editor.&#160;Valencia, Frank. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical Imaging and its Security in Telemedicine Applications ent://SD_ILS/0/SD_ILS:487428 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Thanki, Rohit. author. (orcid)0000-0002-0645-6266&#160;Borra, Surekha. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93311-5">https://doi.org/10.1007/978-3-319-93311-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399145 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Li, Fagen. editor. (orcid)0000-0001-6289-1265&#160;Takagi, Tsuyoshi. editor.&#160;Xu, Chunxiang. editor.&#160;Zhang, Xiaosong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Communications under Hostile Jamming: Security and Efficiency ent://SD_ILS/0/SD_ILS:399157 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Li, Tongtong. author.&#160;Song, Tianlong. author.&#160;Liang, Yuan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:399285 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00006-6">https://doi.org/10.1007/978-3-030-00006-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:400071 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00012-7">https://doi.org/10.1007/978-3-030-00012-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:400080 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chaki, Rituparna. editor.&#160;Cortesi, Agostino. editor.&#160;Saeed, Khalid. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:400367 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00009-7">https://doi.org/10.1007/978-3-030-00009-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400846 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401734 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:399121 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Ganapathi, Geetha. editor.&#160;Subramaniam, Arumugam. editor.&#160;Gra&ntilde;a, Manuel. editor.&#160;Balusamy, Suresh. editor.&#160;Natarajan, Rajamanickam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28&ndash;30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399404 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Dang, Tran Khanh. editor.&#160;K&uuml;ng, Josef. editor.&#160;Wagner, Roland. editor.&#160;Thoai, Nam. editor.&#160;Takizawa, Makoto. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03192-3">https://doi.org/10.1007/978-3-030-03192-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:399473 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Fortino, Giancarlo. editor.&#160;Palau, Carlos E. editor.&#160;Guerrieri, Antonio. editor.&#160;Cuppens, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:399520 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Quaglia, Elizabeth A. editor.&#160;Tomasin, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part IV ent://SD_ILS/0/SD_ILS:399710 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400185 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Beyah, Raheem. editor.&#160;Chang, Bing. editor.&#160;Li, Yingjiu. editor.&#160;Zhu, Sencun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400045 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X&#160;Kuty&#322;owski, Miros&#322;aw. editor. (orcid)0000-0003-3192-2430&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 ent://SD_ILS/0/SD_ILS:400671 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Yang, Xin-She. editor.&#160;Nagar, Atulya K. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400949 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401486 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Mori, Paolo. editor.&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Camp, Olivier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:401907 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Petrenko, Sergei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Information Security A Competency-Based Education Course ent://SD_ILS/0/SD_ILS:401941 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Alsmadi, Izzat. author.&#160;Burdwell, Robert. author.&#160;Aleroud&nbsp;, Ahmed. author.&#160;Wahbeh, Abdallah. author.&#160;Al-Qudah, Mahmoud. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402675 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kerschbaum, Florian. editor.&#160;Paraboschi, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications ent://SD_ILS/0/SD_ILS:400016 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Rao, Nageswara S.V. editor.&#160;Brooks, Richard R. editor.&#160;Wu, Chase Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400221 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Beyah, Raheem. editor.&#160;Chang, Bing. editor.&#160;Li, Yingjiu. editor.&#160;Zhu, Sencun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400376 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chen, Qingfeng. editor.&#160;Wu, Jia. editor.&#160;Zhang, Shichao. editor.&#160;Yuan, Changan. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, V&auml;ster&aring;s, Sweden, September 19-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400344 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053&#160;Skavhaug, Amund. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:400508 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Wan, Jiafu. editor.&#160;Lin, Kai. editor.&#160;Zeng, Delu. editor.&#160;Li, Jin. editor.&#160;Xiang, Yang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401000 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;You, Ilsun. editor.&#160;Leu, Fang-Yie. editor.&#160;Chen, Hsing-Chung. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:401086 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Chaki, Rituparna. editor.&#160;Cortesi, Agostino. editor.&#160;Saeed, Khalid. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Women in Security Changing the Face of Technology and Innovation ent://SD_ILS/0/SD_ILS:402274 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Christofferson, Debra A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:459204 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Winkler, Ira, author.&#160;Gomes, Araceli Treu, author.&#160;Shackleford, Dave, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:458968 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Young, Carl S., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security analytics finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:355388 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Talabis, Mark, author.&#160;McPherson, Robert, author.&#160;Miyamoto, I, author.&#160;Martin, Jason L., author.<br/>Preferred Shelf Number&#160;ONLINE(355388.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128002070">http://www.sciencedirect.com/science/book/9780128002070</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unauthorized access the crisis in online privacy and security ent://SD_ILS/0/SD_ILS:285321 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sloan, Robert H.&#160;Warner, Richard, 1946-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439830147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems ent://SD_ILS/0/SD_ILS:355352 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Knapp, Eric D.&#160;Langill, Joel Thomas.<br/>Preferred Shelf Number&#160;ONLINE(355352.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:355829 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;ONLINE(355829.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:356681 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;ONLINE(356681.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486701 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sideridis, Alexander B. editor.&#160;Kardasiadou, Zoe. editor.&#160;Yialouris, Constantine P. editor.&#160;Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488089 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cleary, Frances. editor.&#160;Felici, Massimo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12574-9">https://doi.org/10.1007/978-3-319-12574-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberpatterns Unifying Design Patterns with Security and Attack Patterns ent://SD_ILS/0/SD_ILS:488814 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Blackwell, Clive. editor.&#160;Zhu, Hong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04447-7">https://doi.org/10.1007/978-3-319-04447-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 ent://SD_ILS/0/SD_ILS:488884 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Krishnan, G. Sai Sundara. editor.&#160;Anitha, R. editor.&#160;Lekshmi, R. S. editor.&#160;Kumar, M. Senthil. editor.&#160;Bonato, Anthony. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488930 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Tryfonas, Theo. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488960 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Sperotto, Anna. editor.&#160;Doyen, Guillaume. editor.&#160;Latr&eacute;, Steven. editor.&#160;Charalambides, Marinos. editor.&#160;Stiller, Burkhard. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43862-6">https://doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489055 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Teufel, Stephanie. editor.&#160;A Min, Tjoa. editor.&#160;You, Illsun. editor.&#160;Weippl, Edgar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10975-6">https://doi.org/10.1007/978-3-319-10975-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ent://SD_ILS/0/SD_ILS:487178 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Hassanien, Aboul Ella. editor.&#160;Kim, Tai-Hoon. editor.&#160;Kacprzyk, Janusz. editor.&#160;Awad, Ali Ismail. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43616-5">https://doi.org/10.1007/978-3-662-43616-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2014 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2014 Conference ent://SD_ILS/0/SD_ILS:487216 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-06708-3">https://doi.org/10.1007/978-3-658-06708-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489506 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Atluri, Vijay. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43936-4">https://doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 -- October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485732 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Felber, Pascal. editor.&#160;Garg, Vijay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11764-5">https://doi.org/10.1007/978-3-319-11764-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:486885 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Wang, Lingyu. author.&#160;Albanese, Massimiliano. author.&#160;Jajodia, Sushil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488011 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Batten, Lynn. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Niu, Wenjia. editor.&#160;Warren, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488140 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Lloret Mauri, Jaime. editor.&#160;Thampi, Sabu M. editor.&#160;Rawat, Danda B. editor.&#160;Jin, Di. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44966-0">https://doi.org/10.1007/978-3-662-44966-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489103 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Wagner, Roland. editor.&#160;Neuhold, Erich J. editor.&#160;Takizawa, Makoto. editor.&#160;K&uuml;ng, Josef. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:286252 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Patil, Harsh Kupwade.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:289974 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Brotby, W. Krag.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data security, data mining and data management : technologies and challenges ent://SD_ILS/0/SD_ILS:280914 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;O'Byrne, Serge, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:288173 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;Williams, Barry L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:146917 2024-11-07T19:41:24Z 2024-11-07T19:41:24Z Author&#160;O'Connor, T. J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>