Search Results for - Narrowed by: Computer security. - Computer science. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ps$003d300? 2024-05-23T20:12:07Z Computer science security : concepts and tools ent://SD_ILS/0/SD_ILS:2334035 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085198 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085630 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/> Human-Computer Interaction. Theories, Methods, and Human Issues 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085488 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91238-7">https://doi.org/10.1007/978-3-319-91238-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26&ndash;28, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085352 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Domingo-Ferrer, Josep. editor. (orcid)0000-0001-7213-4962<br/><a href="https://doi.org/10.1007/978-3-319-99771-1">https://doi.org/10.1007/978-3-319-99771-1</a><br/>Format:&#160;Electronic Resources<br/> Symbiotic Interaction 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18&ndash;19, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085760 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Ham, Jaap. editor. (orcid)0000-0003-1703-5165<br/><a href="https://doi.org/10.1007/978-3-319-91593-7">https://doi.org/10.1007/978-3-319-91593-7</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085299 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format:&#160;Electronic Resources<br/> From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:2085364 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/> Engineering Psychology and Cognitive Ergonomics 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086176 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Harris, Don. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91122-9">https://doi.org/10.1007/978-3-319-91122-9</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2085623 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Logic. New Trends and Applications First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2086102 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Madeira, Alexandre. editor. (orcid)0000-0002-0646-2017<br/><a href="https://doi.org/10.1007/978-3-319-73579-5">https://doi.org/10.1007/978-3-319-73579-5</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:2086980 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084067 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/> Smart and Innovative Trends in Next Generation Computing Technologies Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:2084653 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Bhattacharyya, Pushpak. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8660-1">https://doi.org/10.1007/978-981-10-8660-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084657 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/> Smart and Innovative Trends in Next Generation Computing Technologies Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2084658 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Bhattacharyya, Pushpak. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8657-1">https://doi.org/10.1007/978-981-10-8657-1</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085171 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084401 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2084402 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2084403 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085243 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085464 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/> Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085289 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Yamamoto, Sakae. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085298 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085499 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format:&#160;Electronic Resources<br/> Image and Video Technology PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085851 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Satoh, Shin'ichi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92753-4">https://doi.org/10.1007/978-3-319-92753-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085854 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085517 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format:&#160;Electronic Resources<br/> RoboCup 2017: Robot World Cup XXI ent://SD_ILS/0/SD_ILS:2085312 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Akiyama, Hidehisa. editor. (orcid)0000-0002-9793-9123<br/><a href="https://doi.org/10.1007/978-3-030-00308-1">https://doi.org/10.1007/978-3-030-00308-1</a><br/>Format:&#160;Electronic Resources<br/> Theory and Practice of Model Transformation 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25&ndash;26, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086039 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Rensink, Arend. editor. (orcid)0000-0002-1714-6319<br/><a href="https://doi.org/10.1007/978-3-319-93317-7">https://doi.org/10.1007/978-3-319-93317-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086040 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 15th International Conference, ICIAR 2018, P&oacute;voa de Varzim, Portugal, June 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085883 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Campilho, Aur&eacute;lio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:2086285 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/> Blockchain &ndash; ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086094 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085904 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/> Tests and Proofs 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085913 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Dubois, Catherine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92994-1">https://doi.org/10.1007/978-3-319-92994-1</a><br/>Format:&#160;Electronic Resources<br/> Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection ent://SD_ILS/0/SD_ILS:2086709 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format:&#160;Electronic Resources<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:2084248 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/> Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084542 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084930 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:2084303 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085523 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Computational Data and Social Networks 7th International Conference, CSoNet 2018, Shanghai, China, December 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085424 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Chen, Xuemin. editor. (orcid)0000-0003-3820-9195<br/><a href="https://doi.org/10.1007/978-3-030-04648-4">https://doi.org/10.1007/978-3-030-04648-4</a><br/>Format:&#160;Electronic Resources<br/> Human-Computer Interaction. Interaction in Context 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085385 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91244-8">https://doi.org/10.1007/978-3-319-91244-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086019 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086132 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Software &ndash; ICMS 2018 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085574 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Davenport, James H. editor. (orcid)0000-0002-3982-7545<br/><a href="https://doi.org/10.1007/978-3-319-96418-8">https://doi.org/10.1007/978-3-319-96418-8</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085576 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086184 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92037-5">https://doi.org/10.1007/978-3-319-92037-5</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086193 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format:&#160;Electronic Resources<br/> Designing Usable and Secure Software with IRIS and CAIRIS ent://SD_ILS/0/SD_ILS:2084773 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Faily, Shamal. author.<br/><a href="https://doi.org/10.1007/978-3-319-75493-2">https://doi.org/10.1007/978-3-319-75493-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085186 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/> Multi-Agent Systems and Agreement Technologies 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085070 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Belardinelli, Francesco. editor. (orcid)0000-0002-7768-1794<br/><a href="https://doi.org/10.1007/978-3-030-01713-2">https://doi.org/10.1007/978-3-030-01713-2</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084720 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7&ndash;9, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085643 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085508 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/> Internet Science 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24&ndash;26, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085520 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Bodrunova, Svetlana S. editor. (orcid)0000-0003-0740-561X<br/><a href="https://doi.org/10.1007/978-3-030-01437-7">https://doi.org/10.1007/978-3-030-01437-7</a><br/>Format:&#160;Electronic Resources<br/> IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20&ndash;22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084161 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format:&#160;Electronic Resources<br/> Data Management Technologies and Applications 6th International Conference, DATA 2017, Madrid, Spain, July 24&ndash;26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084881 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94809-6">https://doi.org/10.1007/978-3-319-94809-6</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Germany ent://SD_ILS/0/SD_ILS:2084136 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Schallbruch, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-319-90014-8">https://doi.org/10.1007/978-3-319-90014-8</a><br/>Format:&#160;Electronic Resources<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:2084144 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE ent://SD_ILS/0/SD_ILS:2084233 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Alja&rsquo;am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084265 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084651 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-319-92459-5">https://doi.org/10.1007/978-3-319-92459-5</a><br/>Format:&#160;Electronic Resources<br/> Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085158 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Lahiri, Shuvendu K. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 22nd Iberoamerican Congress, CIARP 2017, Valpara&iacute;so, Chile, November 7&ndash;10, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2085252 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Mendoza, Marcelo. editor. (orcid)0000-0002-7969-6041<br/><a href="https://doi.org/10.1007/978-3-319-75193-1">https://doi.org/10.1007/978-3-319-75193-1</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085253 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/> Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085212 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085213 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085538 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085122 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92034-4">https://doi.org/10.1007/978-3-319-92034-4</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26&ndash;27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085848 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format:&#160;Electronic Resources<br/> Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085792 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Baier, Christel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086054 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085588 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Bauer, Lujo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085893 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format:&#160;Electronic Resources<br/> Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086124 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Mokhtari, Mounir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94523-1">https://doi.org/10.1007/978-3-319-94523-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084238 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085134 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Belhajjame, Khalid. editor. (orcid)0000-0001-6938-0820<br/><a href="https://doi.org/10.1007/978-3-319-98379-0">https://doi.org/10.1007/978-3-319-98379-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085052 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/> Modeling Decisions for Artificial Intelligence 15th International Conference, MDAI 2018, Mallorca, Spain, October 15&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085059 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Torra, Vicen&ccedil;. editor. (orcid)0000-0002-0368-8037<br/><a href="https://doi.org/10.1007/978-3-030-00202-2">https://doi.org/10.1007/978-3-030-00202-2</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084797 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Matou&scaron;ek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084813 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/> Human-Computer Interaction. Interaction Technologies 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085458 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91250-9">https://doi.org/10.1007/978-3-319-91250-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085230 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084620 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085219 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31863-9">https://doi.org/10.1007/978-3-319-31863-9</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 &ndash; September 1, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085222 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Ganty, Pierre. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28766-9">https://doi.org/10.1007/978-3-319-28766-9</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:2086098 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53090-0">https://doi.org/10.1007/978-3-662-53090-0</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086126 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085417 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:2084335 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Alani, Mohammed M. author.<br/><a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/> Subjective Logic A Formalism for Reasoning Under Uncertainty ent://SD_ILS/0/SD_ILS:2084950 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;J&oslash;sang, Audun. author.<br/><a href="https://doi.org/10.1007/978-3-319-42337-1">https://doi.org/10.1007/978-3-319-42337-1</a><br/>Format:&#160;Electronic Resources<br/> Boolean Functions and Their Applications in Cryptography ent://SD_ILS/0/SD_ILS:2084570 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 23rd International Conference, CN 2016, Brun&oacute;w, Poland, June 14-17, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084815 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Gaj, Piotr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39207-3">https://doi.org/10.1007/978-3-319-39207-3</a><br/>Format:&#160;Electronic Resources<br/> Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085004 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Habib, Sheikh Mahbub. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41354-9">https://doi.org/10.1007/978-3-319-41354-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085928 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085800 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085685 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks &ndash; ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085703 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Cheng, Long. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40663-3">https://doi.org/10.1007/978-3-319-40663-3</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085605 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Galinina, Olga. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46301-8">https://doi.org/10.1007/978-3-319-46301-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086096 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085805 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014 ent://SD_ILS/0/SD_ILS:2085810 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49175-1">https://doi.org/10.1007/978-3-662-49175-1</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085812 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085659 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/> Current Trends in Web Engineering ICWE 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086147 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Casteleyn, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46963-8">https://doi.org/10.1007/978-3-319-46963-8</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086186 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085677 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085709 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format:&#160;Electronic Resources<br/> Information Literacy: Key to an Inclusive Society 4th European Conference, ECIL 2016, Prague, Czech Republic, October 10-13, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084207 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52162-6">https://doi.org/10.1007/978-3-319-52162-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084777 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format:&#160;Electronic Resources<br/> Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085234 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Lecomte, Thierry. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33951-1">https://doi.org/10.1007/978-3-319-33951-1</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085238 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:2085858 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086062 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;B&eacute;cue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2086063 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084877 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084839 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084875 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084254 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085430 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085085 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085215 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085225 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085557 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085801 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086151 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086153 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086059 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World&reg;, Florida, USA ent://SD_ILS/0/SD_ILS:2087245 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Technology and Intimacy: Choice or Coercion 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084505 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Kreps, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44805-3">https://doi.org/10.1007/978-3-319-44805-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084716 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085097 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Thinking security : stopping next year's hackers ent://SD_ILS/0/SD_ILS:2308932 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a> <a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format:&#160;Electronic Resources<br/> Control engineering and information systems : proceedings of the 2014 International Conference on Control Engineering and Information System (ICCEIS2014), Yueyang, Hunan, China, 20-22 June 2014 ent://SD_ILS/0/SD_ILS:2305607 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;International Conference on Control Engineering and Information Systems (2014 : Yueyang, Hunan Sheng, China), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781138026858/?ar">https://learning.oreilly.com/library/view/~/9781138026858/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781138026858">https://learning.oreilly.com/library/view/~/9781138026858</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar">https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar</a><br/>Format:&#160;Electronic Resources<br/> The privacy engineer's manifesto : getting from policy to code to QA to value ent://SD_ILS/0/SD_ILS:2302296 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2303294 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:2206165 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pro ASP.NET web API security : securing ASP.NET web API ent://SD_ILS/0/SD_ILS:2298614 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Lakshmiraghavan, Badrinarayanan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar">https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430257820/?ar">https://learning.oreilly.com/library/view/~/9781430257820/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430257820">https://learning.oreilly.com/library/view/~/9781430257820</a><br/>Format:&#160;Electronic Resources<br/> Managing risk and information security : protect to enable ent://SD_ILS/0/SD_ILS:2297326 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Harkins, Malcolm.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar">https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430251132">https://learning.oreilly.com/library/view/~/9781430251132</a> <a href="https://learning.oreilly.com/library/view/~/9781430251132/?ar">https://learning.oreilly.com/library/view/~/9781430251132/?ar</a><br/>Format:&#160;Electronic Resources<br/> Adaptive Security Management Architecture ent://SD_ILS/0/SD_ILS:2326064 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format:&#160;Electronic Resources<br/> SSCP Systems Security Certified Practitioner Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192114 2024-05-23T20:12:07Z 2024-05-23T20:12:07Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294375">Click to View</a><br/>Format:&#160;Electronic Resources<br/>