Search Results for Trust. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTrust.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?2026-02-24T18:37:34ZZero trust journey across the digital estateent://SD_ILS/0/SD_ILS:5607002026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Pillai, Binil, author. Kudrati, Abbas, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003225096">https://www.taylorfrancis.com/books/9781003225096</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:5971422026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Bursell, Mike, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119695158</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security, Privacy and Trust in Cloud Systemsent://SD_ILS/0/SD_ILS:4879462026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Nepal, Surya. editor. Pathan, Mukaddim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zero-trust learning : applications in modern network securityent://SD_ILS/0/SD_ILS:5805822026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Kaushal, Chetna, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781779643575">https://www.taylorfrancis.com/books/9781779643575</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Rise of the machines : when AI and zero trust collide : a Project Zero Trust storyent://SD_ILS/0/SD_ILS:5999322026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Finney, George, author. Vinduska, Zach, author.<br/>Preferred Shelf Number QA76.9 .A25 F56 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394352517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SECURITY, PRIVACY, AND TRUST IN WBANS AND E HEALTHCAREent://SD_ILS/0/SD_ILS:5524422026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Singh, Anuj Kumar. Kumar, Sachin (Computer scientist)<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032635101">https://www.taylorfrancis.com/books/9781032635101</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ZERO TRUST FRAMEWORK AND PRIVILEGED ACCESS MANAGEMENT (PAM)ent://SD_ILS/0/SD_ILS:5552522026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Das, Ravindra.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003470021">https://www.taylorfrancis.com/books/9781003470021</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The zero trust framework : threat hunting & quantum mechanicsent://SD_ILS/0/SD_ILS:5927232026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Das, Ravindra, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003392965">https://www.taylorfrancis.com/books/9781003392965</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust-based communication systems for internet of things applicationsent://SD_ILS/0/SD_ILS:5977442026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Madaan, Vishu, editor. Agrawal, Prateek, editor. Sharma, Anand, editor. Sharma, Dilip Kumar, editor. Agrawal, Akshat, 1986- editor.<br/>Preferred Shelf Number TK5105.8857<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119896746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity and decision makers : data security and digital trustent://SD_ILS/0/SD_ILS:5959432026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Fréminville, Marie de, author.<br/>Preferred Shelf Number HF5548.37 .F74 2020<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4863182026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Gritzalis, Stefanos. editor. Weippl, Edgar R. editor. Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Anderst-Kotsis, Gabriele. editor. Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-27813-7">https://doi.org/10.1007/978-3-030-27813-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4845232026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Nielson, Flemming. editor. (orcid)0000-0001-7362-6176 Sands, David. editor. (orcid)0000-0001-6221-0503 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Thingsent://SD_ILS/0/SD_ILS:4849042026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Hudson, Florence D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security, Privacy and Trust in the IoT Environmentent://SD_ILS/0/SD_ILS:4852302026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Mahmood, Zaigham. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-18075-1">https://doi.org/10.1007/978-3-030-18075-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Trust Management 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4854202026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Mauw, Sjouke. editor. (orcid)0000-0002-2818-4433 Conti, Mauro. editor. (orcid)0000-0002-3612-1934 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-31511-5">https://doi.org/10.1007/978-3-030-31511-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4861172026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Moallem, Abbas. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22351-9">https://doi.org/10.1007/978-3-030-22351-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust Management XIII 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4830092026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Meng, Weizhi. editor. (orcid)0000-0003-4384-5786 Cofta, Piotr. editor. Jensen, Christian Damsgaard. editor. Grandison, Tyrone. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-33716-2">https://doi.org/10.1007/978-3-030-33716-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTent://SD_ILS/0/SD_ILS:5952792026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Tounsi, Wiem, editor.<br/>Preferred Shelf Number QA76.9 .A25 C93 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618393</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001132026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Furnell, Steven. editor. (orcid)0000-0003-0984-7542 Mouratidis, Haralambos. editor. (orcid)0000-0002-2599-0712 Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4020072026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Gal-Oz, Nurit. editor. Lewis, Peter R. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4006402026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Bauer, Lujo. editor. Küsters, Ralf. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4005132026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?ent://SD_ILS/0/SD_ILS:4024512026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Lysne, Olav. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:4867012026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Sideridis, Alexander B. editor. Kardasiadou, Zoe. editor. Yialouris, Constantine P. editor. Zorkadis, Vasilios. editor. (orcid)0000-0003-4399-2495 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11710-2">https://doi.org/10.1007/978-3-319-11710-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4894712026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Abadi, Martín. editor. Kremer, Steve. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4855942026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Holz, Thorsten. editor. (orcid)0000-0002-2783-1264 Ioannidis, Sotiris. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08593-7">https://doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4885302026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Zhou, Jianying. editor. Gal-Oz, Nurit. editor. Zhang, Jie. editor. Gudes, Ehud. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-43813-8">https://doi.org/10.1007/978-3-662-43813-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4889302026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Tryfonas, Theo. editor. Askoxylakis, Ioannis. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4889472026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Eckert, Claudia. editor. Katsikas, Sokratis K. editor. Pernul, Günther. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-09770-1">https://doi.org/10.1007/978-3-319-09770-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4890262026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Mauw, Sjouke. editor. Damsgaard Jensen, Christian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, complexity and control confidence in a convergent worldent://SD_ILS/0/SD_ILS:2975212026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Cofta, Piotr.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0745/2007015560-b.html">http://catdir.loc.gov/catdir/enhancements/fy0745/2007015560-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470517857">http://dx.doi.org/10.1002/9780470517857</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/123232368.html">http://catalog.hathitrust.org/api/volumes/oclc/123232368.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>NANOELECTRONIC DEVICES FOR HARDWARE AND SOFTWARE SECURITYent://SD_ILS/0/SD_ILS:5528652026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Raj, Balwinder. Singh, Arun Kumar.<br/>Preferred Shelf Number TK7874.84<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003126645">https://www.taylorfrancis.com/books/9781003126645</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The cybersecurity control playbook : from fundamentals to advanced strategiesent://SD_ILS/0/SD_ILS:5997892026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOCent://SD_ILS/0/SD_ILS:5994342026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Basta, Alfred, author. Basta, Nadine, author. Anwar, Waqar, author. Essar, Mohammad Ilyas, author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The DevSecOps playbook : deliver continuous security at speedent://SD_ILS/0/SD_ILS:5986342026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Mack, Sean D., author.<br/>Preferred Shelf Number QA76.9 .A25 M33 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394189281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Effective vulnerability management : managing risk in the vulnerable digital ecosystement://SD_ILS/0/SD_ILS:5990472026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Hughes, Chris (Christopher Matthew), author. Robinson, Nikki, author.<br/>Preferred Shelf Number QA76.9 .A25 H84 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277155</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Automated secure computing for next-generation systemsent://SD_ILS/0/SD_ILS:5987522026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number QA76.9 .A25 A98 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Losing the cybersecurity war : and what we can do to stop itent://SD_ILS/0/SD_ILS:5907882026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor King, Steve (Cybersecurity expert), author. Chaudry, Kiren, editor.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003331773">https://www.taylorfrancis.com/books/9781003331773</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Symmetric cryptography. Volume 1 : Design and security proofsent://SD_ILS/0/SD_ILS:5988032026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity in smart homes : architectures, solutions and technologiesent://SD_ILS/0/SD_ILS:5976262026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Khatoun, Rida, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:5954352026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Quade, Phil.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>DNS security managementent://SD_ILS/0/SD_ILS:5938022026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Dooley, Michael, 1962- author. Rooney, Timothy, 1962- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119328292</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Testing code securityent://SD_ILS/0/SD_ILS:5461672026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Van der Linden, Maura A., author.<br/>Preferred Shelf Number QA76.9 .A25 V359 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013795">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Enhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:5448232026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Vemuri, V. Rao.<br/>Preferred Shelf Number TK5105.59 .E62 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Public key infrastructure : building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:5432812026-02-24T18:37:34Z2026-02-24T18:37:34ZAuthor Vacca, John R.<br/>Preferred Shelf Number QA76.9 .A25 P85 2004<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203498156">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>