1. Self- and co-regulation in cybercrime, cybersecurity and national security. (2015) Authors: Tropina, Tatiana; Callanan, Cormac Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Pattern and security requirements : engineering-based establishment of security standards /: engineering-based establishment of security standards. ([2015]) Authors: Beckers, Kristian Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Evolution of cyber technologies and operations to 2035. (2015) Editors: Blowers, Misty Record Type: Book Extent: 1 online resource (xii, 194 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Digital defense : a cybersecurity primer /: a cybersecurity primer. ([2015]) Authors: Pelton, Joseph N; Singh, Indu Bhushan Record Type: Book Extent: 1 online resource (xx, 209 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Security planning : an applied approach /: an applied approach. (2015) Authors: Lincke, Susan Record Type: Book Extent: 1 online resource (xiv, 287 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Critical infrastructure protection research : results of the first critical infrastructure protection research project in Hungary /: results of the first critical infrastructure protection research project in Hungary. ([2016]) Editors: Nádai, László; Padányi, József, 1959- Record Type: Book Extent: 1 online resource, illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Information systems security : 11th international conference, ICISS 2015, Kolkata, India, December 16-20, 2015, proceedings /: 11th international conference, ICISS 2015, Kolkata, India, December 16-20, 2015, proceedings. (2015) Editors: Jajodia, Sushil; Mazumdar, Chandan Other Names: ICISS (Conference), 11th Record Type: Book Extent: 1 online resource (xvi, 584 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Using the common criteria for IT security evaluation. (©2003) Other Names: Herrmann, Debra S Record Type: Book Extent: 1 online resource (xvi, 288 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. The complete book of data anonymization : from planning to implementation /: from planning to implementation. (2013) Other Names: Raghunathan, Balaji Record Type: Book Extent: 1 online resource (xix, 247 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Security in distributed, grid, mobile, and pervasive computing. (©2007) Other Names: Xiao, Yang, 1966- Record Type: Book Extent: 1 online resource (420 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗