Search Results for Will. - Narrowed by: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dWill.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2026-05-11T17:02:49Z
Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agility
ent://SD_ILS/0/SD_ILS:600179
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Arun, Jai Singh, author. Harishankar, Ray, author. Rjaibi, Walid, author. Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number QA76.889<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safeguarding satellite communications : issues, challenges, and solutions
ent://SD_ILS/0/SD_ILS:600245
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author An, Jianpin, author.<br/>Preferred Shelf Number TK5104 .A53 2026<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394304325</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cybersecurity control playbook : from fundamentals to advanced strategies
ent://SD_ILS/0/SD_ILS:599789
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Edwards, Jason (Cybersecurity expert), author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number QA76.9 .A25 E3884 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigms
ent://SD_ILS/0/SD_ILS:600050
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number T59.6 .N49 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum Nonlinear Function Obfuscation Theory and Application
ent://SD_ILS/0/SD_ILS:605562
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Shang, Tao. author. (orcid)0000-0003-2369-1521 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-6722-9">https://doi.org/10.1007/978-981-97-6722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems
ent://SD_ILS/0/SD_ILS:605727
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Cheng, Wei. author. (orcid)0000-0001-9433-7576 Guilley, Sylvain. author. (orcid)0000-0002-5044-3534 Rioul, Olivier. author. (orcid)0000-0002-8681-8916 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-64399-6">https://doi.org/10.1007/978-3-031-64399-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lessons from the Frontlines : Insights from a Cybersecurity Career.
ent://SD_ILS/0/SD_ILS:600433
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Keren.<br/>Preferred Shelf Number XX(600433.1)<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394395439</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners
ent://SD_ILS/0/SD_ILS:608948
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Guo, Fuchun. author. (orcid)0000-0001-6939-7710 Susilo, Willy. author. (orcid)0000-0002-1562-5105 Nguyen, Khoa. author. Chen, Xiaofeng. author. Zhao, Zhen. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY.
ent://SD_ILS/0/SD_ILS:599238
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Preferred Shelf Number HE194 .C93 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394204472</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Blockchains A Handbook on Fundamentals, Platforms and Applications
ent://SD_ILS/0/SD_ILS:602803
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Ruj, Sushmita. editor. Kanhere, Salil S. editor. Conti, Mauro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware for Quantum Computing
ent://SD_ILS/0/SD_ILS:604882
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Easttom, Chuck. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-66477-9">https://doi.org/10.1007/978-3-031-66477-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Operations : A Case Study Approach
ent://SD_ILS/0/SD_ILS:599117
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Couretas, Jerry M., 1966- author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119712121</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022
ent://SD_ILS/0/SD_ILS:601864
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Roy, Bimal Kumar. editor. Chaturvedi, Atul. editor. Tsaban, Boaz. editor. Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-2229-1">https://doi.org/10.1007/978-981-99-2229-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptocoding Based on Quasigroups
ent://SD_ILS/0/SD_ILS:602350
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Mechkaroska, Daniela. author. Popovska-Mitrovikj, Aleksandra. author. (orcid)0000-0002-1578-6275 Bakeva, Verica. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-50125-8">https://doi.org/10.1007/978-3-031-50125-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encrypted Network Traffic Analysis
ent://SD_ILS/0/SD_ILS:604421
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Cherukuri, Aswani Kumar. author. (orcid)0000-0001-8455-9108 Ikram, Sumaiya Thaseen. author. (orcid)0000-0001-8906-2010 Li, Gang. author. Liu, Xiao. author. (orcid)0000-0001-8400-5754 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-62909-9">https://doi.org/10.1007/978-3-031-62909-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 2 : Cryptanalysis and future directions
ent://SD_ILS/0/SD_ILS:598806
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum blockchain : an emerging cryptographic paradigm
ent://SD_ILS/0/SD_ILS:597796
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Dhanaraj, Rajesh Kumar, editor.<br/>Preferred Shelf Number QA76.9 .B56<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking multifactor authentication
ent://SD_ILS/0/SD_ILS:596326
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25 G75 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119672357</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy, regulations, and cybersecurity : the essential business guide
ent://SD_ILS/0/SD_ILS:596472
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number HD61.5 .M675 2021 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto
ent://SD_ILS/0/SD_ILS:595556
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity blue team toolkit
ent://SD_ILS/0/SD_ILS:595209
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Tanner, Nadean H., author.<br/>Preferred Shelf Number QA76.9 .A25 T36 2019 EB<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Applied Cryptography
ent://SD_ILS/0/SD_ILS:546435
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Menezes, Alfred J., author. Katz, Jonathan, author. van Oorschot, Paul C., author. Vanstone, Scott A., author. Taylor and Francis.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware IP Security and Trust
ent://SD_ILS/0/SD_ILS:614176
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Mishra, Prabhat. editor. Bhunia, Swarup. editor. Tehranipoor, Mark. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Guide to Security in SDN and NFV Challenges, Opportunities, and Applications
ent://SD_ILS/0/SD_ILS:613138
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Zhu, Shao Ying. editor. Scott-Hayward, Sandra. editor. Jacquin, Ludovic. editor. Hill, Richard. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security Metrics
ent://SD_ILS/0/SD_ILS:613251
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Wang, Lingyu. author. (orcid)0000-0002-7441-7541 Jajodia, Sushil. author. (orcid)0000-0003-3210-558X Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data Analytics and Decision Support for Cybersecurity Trends, Methodologies and Applications
ent://SD_ILS/0/SD_ILS:615552
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Palomares Carrascosa, Iván. editor. Kalutarage, Harsha Kumara. editor. Huang, Yan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-59439-2">https://doi.org/10.1007/978-3-319-59439-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and Privacy-Preserving Data Communication in Internet of Things
ent://SD_ILS/0/SD_ILS:616283
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Zhu, Liehuang. author. Zhang, Zijian. author. Xu, Chang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding Social Engineering Based Scams
ent://SD_ILS/0/SD_ILS:613967
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Jakobsson, Markus. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Deception Building the Scientific Foundation
ent://SD_ILS/0/SD_ILS:611890
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Introduction to Cyberdeception
ent://SD_ILS/0/SD_ILS:614814
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Rowe, Neil C. author. Rrushi, Julian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ten Laws for Security
ent://SD_ILS/0/SD_ILS:617805
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Diehl, Eric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches
ent://SD_ILS/0/SD_ILS:611086
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Al-Shaer, Ehab. author. Rahman, Mohammad Ashiqur. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Fingerprinting
ent://SD_ILS/0/SD_ILS:614393
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Wang, Cliff. editor. Gerdes, Ryan M. editor. Guan, Yong. editor. Kasera, Sneha Kumar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ethics in Computing A Concise Module
ent://SD_ILS/0/SD_ILS:617386
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Elements of Cloud Storage Security Concepts, Designs and Optimized Practices
ent://SD_ILS/0/SD_ILS:611448
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Galibus, Tatiana. author. Krasnoproshin, Viktor V. author. (orcid)0000-0002-9463-4869 de Oliveira Albuquerque, Robson. author. Pignaton de Freitas, Edison. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How i discovered World War II's greatest spy and other stories of intelligence and code
ent://SD_ILS/0/SD_ILS:540734
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Kahn, David, eauthor. Taylor and Francis.<br/>Preferred Shelf Number D810 .S7<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466562042">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The InfoSec Handbook An Introduction to Information Security
ent://SD_ILS/0/SD_ILS:618581
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Nayak, Umesha. author. Rao, Umesh Hodeghatta. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value
ent://SD_ILS/0/SD_ILS:618599
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Dennedy, Michelle. author. Fox, Jonathan. author. Finneran, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records
ent://SD_ILS/0/SD_ILS:618605
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Robichau, Bernard Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building the Infrastructure for Cloud Security A Solutions View
ent://SD_ILS/0/SD_ILS:618624
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Yeluri, Raghuram. author. Castro-Leon, Enrique. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6146-9">https://doi.org/10.1007/978-1-4302-6146-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Protecting Oracle Database 12c
ent://SD_ILS/0/SD_ILS:618628
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Wright, Paul. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6212-1">https://doi.org/10.1007/978-1-4302-6212-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Hadoop Security
ent://SD_ILS/0/SD_ILS:618551
2026-05-11T17:02:49Z
2026-05-11T17:02:49Z
Author Lakhe, Bhushan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4302-6545-0">https://doi.org/10.1007/978-1-4302-6545-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>