Search Results for Security. - Narrowed by: Electronic books. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300$0026isd$003dtrue? 2024-12-11T09:52:53Z SIP security ent://SD_ILS/0/SD_ILS:297791 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Sisalem, Dorgham.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> LTE security ent://SD_ILS/0/SD_ILS:299540 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Forsberg, Dan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://lib.myilibrary.com?id=449976">Connect to MyiLibrary resource.</a> <a href="http://proquest.safaribooksonline.com/?fpi=9781118380659">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118380642">http://dx.doi.org/10.1002/9781118380642</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=51195">http://www.books24x7.com/marc.asp?bookid=51195</a> ebrary <a href="http://site.ebrary.com/id/10657818">http://site.ebrary.com/id/10657818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID security ent://SD_ILS/0/SD_ILS:254074 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Thornton, Frank.&#160;Haines, Brad.&#160;Das, Anand M.&#160;Bhargava, Hersh.&#160;Campbell, Anita.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490474">http://www.sciencedirect.com/science/book/9781597490474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Kissell, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:253669 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Porter, Thomas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:253616 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Knipp, Eric.&#160;Danielyan, Edgar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">http://www.sciencedirect.com/science/book/9781931836562</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:341816 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Abbadi, Imad M., author.<br/>Preferred Shelf Number&#160;ONLINE(341816.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a> <a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soils and food security ent://SD_ILS/0/SD_ILS:343077 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Hester, R. E. (Ronald E.)&#160;Harrison, Roy M., 1948-<br/>Preferred Shelf Number&#160;ONLINE(343077.1)<br/>Electronic Access&#160;<a href="http://msvu.eblib.com/patron/FullRecord.aspx?p=1186091">Check for Full Text</a> Access restricted: MSVU users only Royal Society of Chemistry <a href="http://dx.doi.org/10.1039/9781849735438">http://dx.doi.org/10.1039/9781849735438</a> ebrary <a href="http://site.ebrary.com/id/10640411">http://site.ebrary.com/id/10640411</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1186091">http://swb.eblib.com/patron/FullRecord.aspx?p=1186091</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:148884 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Maritime security in Southeast Asia ent://SD_ILS/0/SD_ILS:239577 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Bradford, John F.&#160;National Bureau of Asian Research (U.S.)&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131133/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nontraditional security challenges in South Asia ent://SD_ILS/0/SD_ILS:239579 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Bhuiya, Abbas.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131119/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:298878 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Moeller, Robert R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile communication systems and security ent://SD_ILS/0/SD_ILS:249807 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Rhee, Man Young.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5628362</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:301803 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a> John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for telecommunications network management ent://SD_ILS/0/SD_ILS:249697 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Rozenblit, Moshe, 1944-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5263947</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Performance evaluation and attribution of security portfolios ent://SD_ILS/0/SD_ILS:306651 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Fischer, Bernd R.&#160;Wermers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127444833">http://www.sciencedirect.com/science/book/9780127444833</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vehicle safety communications : protocols, security, and privacy ent://SD_ILS/0/SD_ILS:305236 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Delgrossi, Luca.&#160;Zhang, Tao, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=918282">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=918282</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118452189">http://dx.doi.org/10.1002/9781118452189</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=51287">http://www.books24x7.com/marc.asp?bookid=51287</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=918282">http://swb.eblib.com/patron/FullRecord.aspx?p=918282</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security current status and future directions ent://SD_ILS/0/SD_ILS:249506 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Douligeris, C. (Christos)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:306464 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Cross, Michael, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:253670 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Amini, Rob.&#160;Hunter, Laura E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning and cognitive science applications in cyber security ent://SD_ILS/0/SD_ILS:482151 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Khan, Muhammad Salman, author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Africa facing human security challenges in the 21st century ent://SD_ILS/0/SD_ILS:323298 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Mentan, Tatah, author.&#160;Project Muse, distributor.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323298.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9789956792368/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:145371 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Essentials of online payment security and fraud prevention ent://SD_ILS/0/SD_ILS:304086 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Montague, David A., 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118386750">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624574">http://swb.eblib.com/patron/FullRecord.aspx?p=624574</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:149172 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Wheeler, Evan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multi-plant safety and security management in the chemical and process industries ent://SD_ILS/0/SD_ILS:305036 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Reniers, Genserik L. L.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9783527630356">http://dx.doi.org/10.1002/9783527630356</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10383596">http://site.ebrary.com/lib/alltitles/Doc?id=10383596</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless and mobile network security security basics, security in On-the-shelf and emergeing technologies ent://SD_ILS/0/SD_ILS:297992 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Chaouchi, Hakima.&#160;Laurent-Maknavicius, Maryline.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470611883">http://dx.doi.org/10.1002/9780470611883</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10361067">http://site.ebrary.com/lib/alltitles/Doc?id=10361067</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security governance a practical development and implementation approach ent://SD_ILS/0/SD_ILS:297743 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic security systems a manager's guide to evaluating and selecting system solutions ent://SD_ILS/0/SD_ILS:306467 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Pearson, Robert L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679992">http://www.sciencedirect.com/science/book/9780750679992</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic security management a risk assessment guide for decision makers ent://SD_ILS/0/SD_ILS:306471 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Vellani, Karim H., 1971-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical infrastructure protection in homeland security defending a networked nation ent://SD_ILS/0/SD_ILS:303065 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Lewis, T. G. (Theodore Gyle), 1941-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a> John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and ethics social and organizational issues ent://SD_ILS/0/SD_ILS:152966 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Quigley, Marian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:253636 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Andr&eacute;s, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">http://www.sciencedirect.com/science/book/9781931836012</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implosion : lessons from national security, high reliability spacecraft, electronics, and the forces which changed them ent://SD_ILS/0/SD_ILS:249341 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Temple, L. Parker.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480472">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:253989 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Beale, Jay.&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public key cryptography applications and attacks ent://SD_ILS/0/SD_ILS:249342 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Batten, Lynn Margaret.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building sustainability through environmental education ent://SD_ILS/0/SD_ILS:482064 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Wilson, Lynn A., 1954- editor.&#160;Stevenson, Carolyn, 1968- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7727-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7727-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> LEOMA and the US laser industry : the good and bad moves for trade associations in emerging high-tech industries ent://SD_ILS/0/SD_ILS:341945 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Hitz, C. Breck.<br/>Preferred Shelf Number&#160;ONLINE(341945.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10985088">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/PublicFullRecord.aspx?p=1843632">http://public.eblib.com/choice/PublicFullRecord.aspx?p=1843632</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118886472">http://dx.doi.org/10.1002/9781118886472</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1843632">http://swb.eblib.com/patron/FullRecord.aspx?p=1843632</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building peace from within ent://SD_ILS/0/SD_ILS:322721 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Keasley, Alphonse, editor.&#160;DeLuca, Laura, 1963- editor.&#160;Maphosa, Sylvester Bongani, editor.&#160;Africa Institute of South Africa, publisher.&#160;Project Muse, distributor.<br/>Preferred Shelf Number&#160;ONLINE(322721.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780798304412/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Total information risk management maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:306693 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Borek, Alexander.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:306695 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Snedaker, Susan.&#160;Rima, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:341997 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Touhill, Gregory J., author.&#160;Touhill, C. J., 1938- author.<br/>Preferred Shelf Number&#160;ONLINE(341997.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a> ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a> MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Counterterrorism and counterinsurgency in South Asia ent://SD_ILS/0/SD_ILS:239575 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Ahmad, Mumtaz.&#160;National Bureau of Asian Research (U.S.)&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781939131140/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:306461 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Rountree, Derrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability and availability of cloud computing ent://SD_ILS/0/SD_ILS:249383 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Bauer, Eric.&#160;Adams, Randee.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk and Safety Analysis of Nuclear Systems ent://SD_ILS/0/SD_ILS:298891 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Lee, John C., 1941- author.&#160;McCormick, Norman J., 1938- author.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118043462">An electronic book accessible through the World Wide Web; click for information</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=325614&ref=toc">http://www.myilibrary.com?id=325614&ref=toc</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43276">http://www.books24x7.com/marc.asp?bookid=43276</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10494682">http://site.ebrary.com/lib/alltitles/Doc?id=10494682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:298025 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied cryptanalysis breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:249508 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Stamp, Mark.&#160;Low, Richard M., 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:306469 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Maynor, David.&#160;Mookhey, K. K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:306503 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Dubrawsky, Ido.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emergent information technologies and enabling policies for counter-terrorism ent://SD_ILS/0/SD_ILS:249429 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Popp, Robert L.&#160;Yen, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5444075">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5444075</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:253863 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;XYPRO Technology Corporation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:254075 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Baskin, Brian.&#160;Piltzecker, Tony, 1975-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:253664 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Craig, Paul.&#160;Honick, Ron.&#160;Burnett, Mark (Mark M.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:253672 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Wyler, Neil R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber spying tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:253673 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Fair, Ted.&#160;Nordfelt, Michael.&#160;Ring, Sandra.&#160;Cole, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:253681 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Bayles, Aaron W.&#160;Brindley, Ed.&#160;Foster, James C.&#160;Hurley, Chris.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing and securing a Cisco structured wireless-aware network ent://SD_ILS/0/SD_ILS:253637 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Wall, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">http://www.sciencedirect.com/science/book/9781932266917</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless hacking projects for Wi-Fi enthusiasts ent://SD_ILS/0/SD_ILS:253648 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Barken, Lee.&#160;Bermel, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836371">http://www.sciencedirect.com/science/book/9781931836371</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:253847 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Rittinghouse, John W.&#160;Hancock, Bill, 1957-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Scene of the cybercrime computer forensics handbook ent://SD_ILS/0/SD_ILS:253615 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Shinder, Debra Littlejohn.&#160;Tittel, Ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:253618 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Ahmad, David R. Mirza.&#160;Russell, Ryan, 1969-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social work research with minority and oppressed populations : methodological issues and innovations ent://SD_ILS/0/SD_ILS:390503 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Potocky-Tripodi, Miriam, editor.&#160;Rodgers-Farmer, Antoinette Y., editor.<br/>Electronic Access&#160;EBSCOhost SocINDEX with Full Text <a href="http://search.ebscohost.com/login.aspx?direct=true&db=sih&jid=254K&site=ehost-live">http://search.ebscohost.com/login.aspx?direct=true&db=sih&jid=254K&site=ehost-live</a> EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=696706">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=696706</a> EBSCOhost <a href="http://search.ebscohost.com/direct.asp?db=sih&jid=%22254K%22&scope=site">http://search.ebscohost.com/direct.asp?db=sih&jid=%22254K%22&scope=site</a> EBSCOhost <a href="http://search.ebscohost.com/direct.asp?db=sih&jid=254K&scope=site">http://search.ebscohost.com/direct.asp?db=sih&jid=254K&scope=site</a> MyiLibrary <a href="http://www.myilibrary.com?id=573287">http://www.myilibrary.com?id=573287</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;~0<br/> Contemporary cryptology the science of information integrity ent://SD_ILS/0/SD_ILS:249661 2024-12-11T09:52:53Z 2024-12-11T09:52:53Z Author&#160;Simmons, Gustavus J.&#160;Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>