Search Results for Technology. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTechnology.$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list 2026-03-27T23:32:38Z Blockchain Technology and Application 7th CCF China Blockchain Conference, CBCC 2024, Shanghai, China, December 13-15, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:608895 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Zhu, Liehuang. editor.&#160;Sun, Yi. editor.&#160;Zhu, Jianming. editor.&#160;Wu, Qianhong. editor.&#160;Song, Xianhua. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6232-6">https://doi.org/10.1007/978-981-96-6232-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain Technology and Application 7th CCF China Blockchain Conference, CBCC 2024, Shanghai, China, December 13-15, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:608914 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Zhu, Liehuang. editor.&#160;Sun, Yi. editor.&#160;Zhu, Jianming. editor.&#160;Wu, Qianhong. editor.&#160;Song, Xianhua. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6243-2">https://doi.org/10.1007/978-981-96-6243-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Network Security and Blockchain Technology ICNSBT 2025 ent://SD_ILS/0/SD_ILS:610331 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Giri, Debasis. editor.&#160;Kambourakis, Georgios. editor.&#160;Islam, SK Hafizul. editor. (orcid)0000-0002-2703-0213&#160;Srivastava, Gautam. editor. (orcid)0000-0001-9851-4103&#160;Maitra, Tanmoy. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-6348-4">https://doi.org/10.1007/978-981-96-6348-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigms ent://SD_ILS/0/SD_ILS:600050 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;T59.6 .N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Network Security and Blockchain Technology ICNSBT 2024 ent://SD_ILS/0/SD_ILS:607924 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Giri, Debasis. editor.&#160;Islam, S. K. Hafizul. editor. (orcid)0000-0002-2703-0213&#160;Vasilakos, Athanasios V. editor.&#160;Khan, Muhammad Khurram. editor. (orcid)0000-0001-6636-0533&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8051-8">https://doi.org/10.1007/978-981-97-8051-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Technology 5th International Conference, ICFT 2024, Singapore, September 23-25, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607845 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Huang, Ke-Wei. editor. (orcid)0000-0002-9932-6195&#160;Cao, Qi. editor. (orcid)0000-0003-3243-5693&#160;Su, Ruidan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3811-6">https://doi.org/10.1007/978-981-96-3811-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain Technology and Application 6th CCF China Blockchain Summit, CBCS 2023, Haikou, China, December 15-18, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:604019 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Zhu, Jianming. editor.&#160;Wu, Qianhong. editor.&#160;Ding, Yong. editor. (orcid)0000-0002-3571-7576&#160;Song, Xianhua. editor. (orcid)0000-0002-0111-8559&#160;Lu, Zeguang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-3203-6">https://doi.org/10.1007/978-981-97-3203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Network Security and Blockchain Technology ICNSBT 2023 ent://SD_ILS/0/SD_ILS:602048 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Mandal, Jyotsna Kumar. editor. (orcid)0000-0001-9447-647X&#160;Jana, Biswapati. editor.&#160;Lu, Tzu-Chuen. editor. (orcid)0000-0001-7305-4622&#160;De, Debashis. editor. (orcid)0000-0002-9688-9806&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-4433-0">https://doi.org/10.1007/978-981-99-4433-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:618109 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;Hartenstein, Hannes. editor.&#160;Herrera-Joancomart&iacute;, Jordi. editor. (orcid)0000-0002-4935-4681&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:610826 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Bica, Ion. editor.&#160;Reyhanitabar, Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:618008 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Stajano, Frank. editor.&#160;Mj&oslash;lsnes, Stig F. editor.&#160;Jenkinson, Graeme. editor.&#160;Thorsheim, Per. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soliton Coding for Secured Optical Communication Link ent://SD_ILS/0/SD_ILS:530297 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Sadegh Amiri, Iraj. author.&#160;Alavi, Sayed Ehsan. author.&#160;Mahdaliza Idrus, Sevia. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-161-9">https://doi.org/10.1007/978-981-287-161-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608475 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Nemec Zlatolas, Lili. editor. (orcid)0000-0002-2086-9825&#160;Rannenberg, Kai. editor. (orcid)0009-0000-6142-7161&#160;Welzer, Tatjana. editor. (orcid)0000-0002-6865-4946&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-92886-4">https://doi.org/10.1007/978-3-031-92886-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:608496 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Nemec Zlatolas, Lili. editor. (orcid)0000-0002-2086-9825&#160;Rannenberg, Kai. editor. (orcid)0009-0000-6142-7161&#160;Welzer, Tatjana. editor. (orcid)0000-0002-6865-4946&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-92882-6">https://doi.org/10.1007/978-3-031-92882-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. Generating Futures 19th IFIP WG 9.6/11.7 and IFIP WG 11.6 International Summer School, Privacy and Identity 2024, Madrid, Spain, September 10-13, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608555 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Bieker, Felix. editor.&#160;De Conca, Silvia. editor. (orcid)0000-0002-9356-9815&#160;Del Alamo, Jose M. editor. (orcid)0000-0002-6513-0303&#160;Mart&iacute;n, Yod Samuel. editor. (orcid)0000-0002-0065-5117&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91054-8">https://doi.org/10.1007/978-3-031-91054-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. Sharing in a Digital World 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:603301 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Bieker, Felix. editor.&#160;de Conca, Silvia. editor. (orcid)0000-0002-9356-9815&#160;Gruschka, Nils. editor.&#160;Jensen, Meiko. editor.&#160;Schiering, Ina. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57978-3">https://doi.org/10.1007/978-3-031-57978-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Choice and Computers 16th IFIP International Conference on Human Choice and Computers, HCC 2024, Phuket, Thailand, September 8-10, 2024, Proceedings ent://SD_ILS/0/SD_ILS:604558 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Davison, Robert M. editor. (orcid)0000-0002-7243-3521&#160;Kreps, David. editor. (orcid)0000-0002-5776-2888&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-67535-5">https://doi.org/10.1007/978-3-031-67535-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:603324 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Meyer, Norbert. editor.&#160;Grocholewska-Czury&#322;o, Anna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-56326-3">https://doi.org/10.1007/978-3-031-56326-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, Proceedings ent://SD_ILS/0/SD_ILS:604454 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Pitropakis, Nikolaos. editor. (orcid)0000-0002-3392-9970&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;Markantonakis, Konstantinos. editor. (orcid)0000-0003-3975-9033&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65175-5">https://doi.org/10.1007/978-3-031-65175-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611573 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;De Capitani di Vimercati, Sabrina. editor. (orcid)0000-0003-0793-3551&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611592 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611549 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:617612 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Hoepman, Jaap-Henk. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and its challenges in the 21st Century ent://SD_ILS/0/SD_ILS:597077 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Guerrier, Claudine, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119854852</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Audio Watermarking Based on Singular Value Decomposition ent://SD_ILS/0/SD_ILS:530260 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Dhar, Pranab Kumar. author.&#160;Shimamura, Tetsuya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14800-7">https://doi.org/10.1007/978-3-319-14800-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agility ent://SD_ILS/0/SD_ILS:600179 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Arun, Jai Singh, author.&#160;Harishankar, Ray, author.&#160;Rjaibi, Walid, author.&#160;Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number&#160;QA76.889<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safeguarding satellite communications : issues, challenges, and solutions ent://SD_ILS/0/SD_ILS:600245 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;An, Jianpin, author.<br/>Preferred Shelf Number&#160;TK5104 .A53 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation mechanism for data encryption ent://SD_ILS/0/SD_ILS:552326 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Kumar, Keshav (Engineer), editor.&#160;Pandey, Bishwajeet, editor.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003508632">https://www.taylorfrancis.com/books/9781003508632</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605357 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8016-7">https://doi.org/10.1007/978-981-97-8016-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605415 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Kohlweiss, Markulf. editor. (orcid)0000-0002-8660-9663&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Beresford, Alastair. editor. (orcid)0000-0003-0818-6535&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-8013-6">https://doi.org/10.1007/978-981-97-8013-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:606898 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-71522-9">https://doi.org/10.1007/978-3-030-71522-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber defense : best practices for digital safety ent://SD_ILS/0/SD_ILS:600003 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Edwards, Jason, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E39 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394337040</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence Security and Privacy Second International Conference, AIS&amp;P 2024, Guangzhou, China, December 6-7, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606953 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Zhang, Fangguo. editor. (orcid)0000-0002-0486-6413&#160;Lin, Weiwei. editor. (orcid)0000-0001-6876-1795&#160;Yan, Hongyang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-1148-5">https://doi.org/10.1007/978-981-96-1148-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 26th International Conference, PAM 2025, Virtual Event, March 10-12, 2025, Proceedings ent://SD_ILS/0/SD_ILS:607570 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Testart, Cecilia. editor.&#160;van Rijswijk-Deij, Roland. editor.&#160;Stiller, Burkhard. editor. (orcid)0000-0002-7461-7463&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85960-1">https://doi.org/10.1007/978-3-031-85960-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault-Tolerant Distributed Consensus in Synchronous Networks ent://SD_ILS/0/SD_ILS:607763 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Choudhury, Ashish. author.&#160;Patra, Arpita. author. (orcid)0000-0002-8036-4407&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80460-1">https://doi.org/10.1007/978-3-031-80460-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The cybersecurity control playbook : from fundamentals to advanced strategies ent://SD_ILS/0/SD_ILS:599789 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Edwards, Jason (Cybersecurity expert), author.&#160;John Wiley &amp; Sons, publisher.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E3884 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Biometrics ent://SD_ILS/0/SD_ILS:605790 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Jain, Anil K. author.&#160;Ross, Arun A. author. (orcid)0000-0001-8850-3013&#160;Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725&#160;Swearingen, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&amp;P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602516 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Vaidya, Jaideep. editor.&#160;Gabbouj, Moncef. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9785-5">https://doi.org/10.1007/978-981-99-9785-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&amp;P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602517 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Vaidya, Jaideep. editor.&#160;Gabbouj, Moncef. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9788-6">https://doi.org/10.1007/978-981-99-9788-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602834 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Abie, Habtamu. editor. (orcid)0000-0003-0866-5050&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Verderame, Luca. editor. (orcid)0000-0001-7155-7429&#160;Cambiaso, Enrico. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54129-2">https://doi.org/10.1007/978-3-031-54129-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Operations : A Case Study Approach ent://SD_ILS/0/SD_ILS:599117 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602750 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor. (orcid)0000-0001-8792-0413&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54204-6">https://doi.org/10.1007/978-3-031-54204-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:603434 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58734-4">https://doi.org/10.1007/978-3-031-58734-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYBERSECURITY IN THE TRANSPORTATION INDUSTRY. ent://SD_ILS/0/SD_ILS:599238 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Preferred Shelf Number&#160;HE194 .C93 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602288 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Shao, Jun. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9614-8">https://doi.org/10.1007/978-981-99-9614-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 25th International Conference, PAM 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602948 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Richter, Philipp. editor.&#160;Bajpai, Vaibhav. editor.&#160;Carisimo, Esteban. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-56252-5">https://doi.org/10.1007/978-3-031-56252-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:603382 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58716-0">https://doi.org/10.1007/978-3-031-58716-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:603383 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58737-5">https://doi.org/10.1007/978-3-031-58737-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V ent://SD_ILS/0/SD_ILS:603384 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58740-5">https://doi.org/10.1007/978-3-031-58740-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:603385 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58751-1">https://doi.org/10.1007/978-3-031-58751-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:603386 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58754-2">https://doi.org/10.1007/978-3-031-58754-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:603492 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Joye, Marc. editor. (orcid)0000-0003-4433-2333&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58723-8">https://doi.org/10.1007/978-3-031-58723-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 - March 1, 2024, Proceedings ent://SD_ILS/0/SD_ILS:603949 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Bouzefrane, Samia. editor. (orcid)0000-0002-0979-1289&#160;Sauveron, Damien. editor. (orcid)0000-0001-7948-6143&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-60391-4">https://doi.org/10.1007/978-3-031-60391-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective vulnerability management : managing risk in the vulnerable digital ecosystem ent://SD_ILS/0/SD_ILS:599047 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Hughes, Chris (Christopher Matthew), author.&#160;Robinson, Nikki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H84 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs ent://SD_ILS/0/SD_ILS:577899 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Chowdhury, Rajdeep, editor.&#160;Niranjan, S. K., editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern cryptography with proof techniques and implementations. ent://SD_ILS/0/SD_ILS:577000 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Hwang, Seong Oun, author.&#160;Kim, Intae, author.&#160;Lee, Wai Kong, author.<br/>Preferred Shelf Number&#160;TK5102.94 .M63 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003152569">https://www.taylorfrancis.com/books/9781003152569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking multifactor authentication ent://SD_ILS/0/SD_ILS:596326 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 G75 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership ent://SD_ILS/0/SD_ILS:595887 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Carey, Marcus J. (Cybersecurity professional), author.&#160;Jin, Jennifer.<br/>Preferred Shelf Number&#160;QA76.9 .A25 C37 2020<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:595209 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Tanner, Nadean H., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 T36 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain for distributed systems security ent://SD_ILS/0/SD_ILS:595146 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Shetty, Sachin, editor.&#160;Kamhoua, Charles A., edtior.&#160;Njilla, Laurent L., editor.<br/>Preferred Shelf Number&#160;QA76.9 .B56 B56 2019 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119519621</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:595435 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Quade, Phil.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidence ent://SD_ILS/0/SD_ILS:594530 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Furneaux, Nick, author.&#160;Knottenbelt, William J., writer of foreword.<br/>Preferred Shelf Number&#160;HV8079 .C65 F87 2018<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119549314</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:610931 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Katz, Jonathan. editor.&#160;Shacham, Hovav. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611153 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Liu, Joseph K. editor.&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Voting First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:612088 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Krimmer, Robert. editor.&#160;Volkamer, Melanie. editor.&#160;Barrat, Jordi. editor.&#160;Benaloh, Josh. editor.&#160;Goodman, Nicole. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52240-1">https://doi.org/10.1007/978-3-319-52240-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:612685 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Grossklags, Jens. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-54970-4">https://doi.org/10.1007/978-3-662-54970-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:613304 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Kalai, Yael. editor.&#160;Reyzin, Leonid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:610861 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Kiayias, Aggelos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70972-7">https://doi.org/10.1007/978-3-319-70972-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611655 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Okamoto, Tatsuaki. editor.&#160;Yu, Yong. editor.&#160;Au, Man Ho. editor.&#160;Li, Yannan. editor. (orcid)0000-0002-4407-9027&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:611657 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70712-9">https://doi.org/10.1007/978-3-319-70712-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611756 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Xu, Ming. editor.&#160;Qin, Zheng. editor.&#160;Yan, Fei. editor.&#160;Fu, Shaojing. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612534 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Polychronakis, Michalis. editor.&#160;Meier, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trustworthy Transportation Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:612754 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Sun, Yunchuan. editor.&#160;Song, Houbing. editor. (orcid)0000-0003-2631-9223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613961 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Krimmer, Robert. editor.&#160;Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043&#160;Braun Binder, Nadja. editor.&#160;Kersting, Norbert. editor.&#160;Pereira, Olivier. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68687-5">https://doi.org/10.1007/978-3-319-68687-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:615622 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Nematollahi, Mohammad Ali. author.&#160;Vorakulpipat, Chalee. author.&#160;Rosales, Hamurabi Gamboa. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618102 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the hacker : learn from the experts who take down hackers ent://SD_ILS/0/SD_ILS:593636 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:616283 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Zhu, Liehuang. author.&#160;Zhang, Zijian. author.&#160;Xu, Chang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617319 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Rak, Jacek. editor.&#160;Bay, John. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;Popyack, Leonard. editor.&#160;Skormin, Victor. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:617961 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Stajano, Frank. editor.&#160;Anderson, Jonathan. editor.&#160;Christianson, Bruce. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:614789 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Kim, Kuinam J. editor.&#160;Wattanapongsakorn, Naruemon. editor.&#160;Joukov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:616119 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Clark, Jeremy. editor.&#160;Meiklejohn, Sarah. editor.&#160;Ryan, Peter Y.A. editor.&#160;Wallach, Dan. editor.&#160;Brenner, Michael. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616529 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Chen, Liqun. editor.&#160;Han, Jinguang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616726 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Foresti, Sara. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:611814 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Swarup, Vipin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:617822 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Ryan, Peter Y. A. editor.&#160;Naccache, David. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:617805 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Diehl, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:616141 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Bas, Patrick. author.&#160;Furon, Teddy. author.&#160;Cayre, Fran&ccedil;ois. author.&#160;Do&euml;rr, Gwena&euml;l. author.&#160;Mathon, Benjamin. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethics in Computing A Concise Module ent://SD_ILS/0/SD_ILS:617386 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:618019 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Domingo-Ferrer, Josep. editor. (orcid)0000-0001-7213-4962&#160;Peji&#263;-Bach, Mirjana. editor. (orcid)0000-0003-3899-6707&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:618581 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Nayak, Umesha. author.&#160;Rao, Umesh Hodeghatta. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:618599 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building the Infrastructure for Cloud Security A Solutions View ent://SD_ILS/0/SD_ILS:618624 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Yeluri, Raghuram. author.&#160;Castro-Leon, Enrique. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6146-9">https://doi.org/10.1007/978-1-4302-6146-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security and cryptography : specifications and implementations ent://SD_ILS/0/SD_ILS:543513 2026-03-27T23:32:38Z 2026-03-27T23:32:38Z Author&#160;Sklavos, Nicolas.&#160;Zhang, Xinmiao.<br/>Preferred Shelf Number&#160;TK5103.2 .W57415 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>