Search Results for reference. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dreference.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-26T13:17:58Z Information security policies and procedures : a practitioner's reference ent://SD_ILS/0/SD_ILS:547228 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P428 2004<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203488737">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Fusion of Machine Learning Paradigms Theory and Applications ent://SD_ILS/0/SD_ILS:526924 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Hatzilygeroudis, Ioannis K. editor.&#160;Tsihrintzis, George A. editor.&#160;Jain, Lakhmi C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-22371-6">https://doi.org/10.1007/978-3-031-22371-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Blockchain Technology Real-World Applications ent://SD_ILS/0/SD_ILS:529096 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Panda, Sandeep Kumar. editor.&#160;Mishra, Vaibhav. editor.&#160;Dash, Sujata Priyambada. editor.&#160;Pani, Ashis Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-22835-3">https://doi.org/10.1007/978-3-031-22835-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Challenges of Software Verification ent://SD_ILS/0/SD_ILS:528145 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Arceri, Vincenzo. editor.&#160;Cortesi, Agostino. editor.&#160;Ferrara, Pietro. editor.&#160;Olliaro, Martina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9601-6">https://doi.org/10.1007/978-981-19-9601-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence in Cyber Security: Theories and Applications ent://SD_ILS/0/SD_ILS:528553 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Bhardwaj, Tushar. editor.&#160;Upadhyay, Himanshu. editor.&#160;Sharma, Tarun Kumar. editor.&#160;Fernandes, Steven Lawrence. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-28581-3">https://doi.org/10.1007/978-3-031-28581-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:611692 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Hassanien, Aboul Ella. editor.&#160;Mostafa Fouad, Mohamed. editor.&#160;Manaf, Azizah Abdul. editor.&#160;Zamani, Mazdak. editor.&#160;Ahmad, Rabiah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptographic Definitions A Step-by-Step Guide for Beginners ent://SD_ILS/0/SD_ILS:608948 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Guo, Fuchun. author. (orcid)0000-0001-6939-7710&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Nguyen, Khoa. author.&#160;Chen, Xiaofeng. author.&#160;Zhao, Zhen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91969-5">https://doi.org/10.1007/978-3-031-91969-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 6G Cyber Security Resilience: Trends and Challenges ent://SD_ILS/0/SD_ILS:608660 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Gururaj, H. L. editor.&#160;Ravi, VinayaKumar. editor. (orcid)0000-0001-6873-6469&#160;Shreyas, J. editor.&#160;Pavithra, N. editor.&#160;Sapna, R. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85008-0">https://doi.org/10.1007/978-3-031-85008-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Joint Conference on Advances in Computational Intelligence IJCACI 2024, Volume 2 ent://SD_ILS/0/SD_ILS:608848 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Uddin, Mohammad Shorif. editor. (orcid)0000-0002-7184-2809&#160;Bansal, Jagdish Chand. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3762-1">https://doi.org/10.1007/978-981-96-3762-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Joint Conference on Advances in Computational Intelligence IJCACI 2024, Volume 1 ent://SD_ILS/0/SD_ILS:609077 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Uddin, Mohammad Shorif. editor. (orcid)0000-0002-7184-2809&#160;Bansal, Jagdish Chand. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3741-6">https://doi.org/10.1007/978-981-96-3741-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Computing, Cyber Security and Cryptography Issues, Technologies, Algorithms, Programming and Strategies ent://SD_ILS/0/SD_ILS:609403 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Goyal, S. B. editor.&#160;Kumar, Vidyapati. editor.&#160;Islam, Sardar M. N. editor. (orcid)0000-0001-9451-7390&#160;Ghai, Deepika. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4948-8">https://doi.org/10.1007/978-981-96-4948-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Digital Forensics A Guide to Theory, Research and Applications ent://SD_ILS/0/SD_ILS:602993 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;K&auml;vrestad, Joakim. author.&#160;Birath, Marcus. author. (orcid)0000-0001-5692-4008&#160;Clarke, Nathan. author. (orcid)0000-0002-3595-3800&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53649-6">https://doi.org/10.1007/978-3-031-53649-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability Engineering for Industrial Processes An Analytics Perspective ent://SD_ILS/0/SD_ILS:603298 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Kapur, P. K. editor. (orcid)0000-0001-8006-5952&#160;Pham, Hoang. editor.&#160;Singh, Gurinder. editor. (orcid)0000-0002-7827-1578&#160;Kumar, Vivek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55048-5">https://doi.org/10.1007/978-3-031-55048-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of 4th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications ICMISC 2023 ent://SD_ILS/0/SD_ILS:603632 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Gunjan, Vinit Kumar. editor. (orcid)0000-0002-3222-4186&#160;Zurada, Jacek M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9442-7">https://doi.org/10.1007/978-981-99-9442-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Face Recognition ent://SD_ILS/0/SD_ILS:602213 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Li, Stan Z. editor.&#160;Jain, Anil K. editor.&#160;Deng, Jiankang. editor. (orcid)0000-0002-3709-6216&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-43567-6">https://doi.org/10.1007/978-3-031-43567-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:602382 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47549-8">https://doi.org/10.1007/978-3-031-47549-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchains A Handbook on Fundamentals, Platforms and Applications ent://SD_ILS/0/SD_ILS:602803 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Ruj, Sushmita. editor.&#160;Kanhere, Salil S. editor.&#160;Conti, Mauro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Frontiers in Computing and Systems COMSYS 2022 ent://SD_ILS/0/SD_ILS:527858 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Sarkar, Ram. editor.&#160;Pal, Sujata. editor.&#160;Basu, Subhadip. editor.&#160;Plewczynski, Dariusz. editor.&#160;Bhattacharjee, Debotosh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2680-0">https://doi.org/10.1007/978-981-99-2680-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data quality : empowering businesses with analytics and AI ent://SD_ILS/0/SD_ILS:598155 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Southekal, Prashanth H., author.<br/>Preferred Shelf Number&#160;HF5548.2 .S687 2023 EB<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394320547</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Connected Environments for the Internet of Things Challenges and Solutions ent://SD_ILS/0/SD_ILS:612157 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70102-8">https://doi.org/10.1007/978-3-319-70102-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Metrics ent://SD_ILS/0/SD_ILS:613251 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Wang, Lingyu. author. (orcid)0000-0002-7441-7541&#160;Jajodia, Sushil. author. (orcid)0000-0003-3210-558X&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts ent://SD_ILS/0/SD_ILS:613224 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Martellini, Maurizio. editor.&#160;Malizia, Andrea. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-62108-1">https://doi.org/10.1007/978-3-319-62108-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Compilation for Secure Multi-party Computation ent://SD_ILS/0/SD_ILS:613253 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;B&uuml;scher, Niklas. author.&#160;Katzenbeisser, Stefan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67522-0">https://doi.org/10.1007/978-3-319-67522-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:616353 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Traor&eacute;, Issa. editor.&#160;Awad, Ahmed. editor.&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:614176 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Mishra, Prabhat. editor.&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical Image Watermarking Techniques and Applications ent://SD_ILS/0/SD_ILS:610831 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Singh, Amit Kumar. editor.&#160;Kumar, Basant. editor.&#160;Singh, Ghanshyam. editor.&#160;Mohan, Anand. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57699-2">https://doi.org/10.1007/978-3-319-57699-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Group-target Tracking ent://SD_ILS/0/SD_ILS:618179 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Geng, Wen-dong. author.&#160;Wang, Yuan-qin. author.&#160;Dong, Zheng-hong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Differential Privacy and Applications ent://SD_ILS/0/SD_ILS:616482 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Zhu, Tianqing. author.&#160;Li, Gang. author.&#160;Zhou, Wanlei. author.&#160;Yu, Philip S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-62004-6">https://doi.org/10.1007/978-3-319-62004-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:617853 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Mayes, Keith. editor.&#160;Markantonakis, Konstantinos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fraud Prevention in Online Digital Advertising ent://SD_ILS/0/SD_ILS:618267 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Zhu, Xingquan. author. (orcid)0000-0003-4129-9611&#160;Tao, Haicheng. author.&#160;Wu, Zhiang. author.&#160;Cao, Jie. author.&#160;Kalish, Kristopher. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-56793-8">https://doi.org/10.1007/978-3-319-56793-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools ent://SD_ILS/0/SD_ILS:618425 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Bhuyan, Monowar H. author.&#160;Bhattacharyya, Dhruba K. author.&#160;Kalita, Jugal K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65188-0">https://doi.org/10.1007/978-3-319-65188-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:612882 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Yu, Shui. editor.&#160;Guo, Song. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:613967 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Jakobsson, Markus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure System Design and Trustable Computing ent://SD_ILS/0/SD_ILS:614266 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Chang, Chip-Hong. editor.&#160;Potkonjak, Miodrag. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14971-4">https://doi.org/10.1007/978-3-319-14971-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:614393 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Wang, Cliff. editor.&#160;Gerdes, Ryan M. editor.&#160;Guan, Yong. editor.&#160;Kasera, Sneha Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:614814 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Rowe, Neil C. author.&#160;Rrushi, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Sensor Networks Security, Coverage, and Localization ent://SD_ILS/0/SD_ILS:611390 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Selmic, Rastko R. author.&#160;Phoha, Vir V. author.&#160;Serwadda, Abdul. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Network Forensics A Research Perspective ent://SD_ILS/0/SD_ILS:618148 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Joshi, R.C. author.&#160;Pilli, Emmanuel S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-7299-4">https://doi.org/10.1007/978-1-4471-7299-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Systems Safety and Security ent://SD_ILS/0/SD_ILS:615813 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Pricop, Emil. editor. (orcid)0000-0002-4021-6549&#160;Stamatescu, Grigore. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32525-5">https://doi.org/10.1007/978-3-319-32525-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Boolean Functions and Their Applications in Cryptography ent://SD_ILS/0/SD_ILS:617119 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Wu, Chuan-Kun. author.&#160;Feng, Dengguo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:617823 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Alani, Mohammed M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:617849 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Network Hacks Attack and Defense with Python ent://SD_ILS/0/SD_ILS:530100 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Ballmann, Bastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44437-5">https://doi.org/10.1007/978-3-662-44437-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced API Security Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE ent://SD_ILS/0/SD_ILS:618586 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Siriwardena, Prabath. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6817-8">https://doi.org/10.1007/978-1-4302-6817-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building the Infrastructure for Cloud Security A Solutions View ent://SD_ILS/0/SD_ILS:618624 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Yeluri, Raghuram. author.&#160;Castro-Leon, Enrique. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6146-9">https://doi.org/10.1007/978-1-4302-6146-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-03-26T13:17:58Z 2026-03-26T13:17:58Z Author&#160;Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H52 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>