1. Self- and co-regulation in cybercrime, cybersecurity and national security. (2015) Authors: Tropina, Tatiana; Callanan, Cormac Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Cybersecurity in Israel. ([2015]) Authors: Tabansky, Lior; Ben-Israel, Isaac Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Protecting privacy in data release. ([2015]) Authors: Livraga, Giovanni Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Pattern and security requirements : engineering-based establishment of security standards /: engineering-based establishment of security standards. ([2015]) Authors: Beckers, Kristian Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Evolution of cyber technologies and operations to 2035. (2015) Editors: Blowers, Misty Record Type: Book Extent: 1 online resource (xii, 194 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Digital defense : a cybersecurity primer /: a cybersecurity primer. ([2015]) Authors: Pelton, Joseph N; Singh, Indu Bhushan Record Type: Book Extent: 1 online resource (xx, 209 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Cyber denial, deception and counter deception : a framework for supporting active cyber defense /: a framework for supporting active cyber defense. (2015) Authors: Heckman, Kristin E; Stech, Frank J; Thomas, Roshan K; Schmoker, Ben; Tsow, Alexander W Record Type: Book Extent: 1 online resource (xv, 251 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Multimedia forensics and security : foundations, innovations, and applications /: foundations, innovations, and applications. ([2017]) Editors: Hassanien, Aboul Ella Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Proceedings of the 2nd Workshop on Communication Security : cryptography and physical layer security /: cryptography and physical layer security. ([2018]) Editors: (Assistant professor in telecommunications), Baldi, Marco; Quaglia, Elizabeth A; Tomasin, Stefano Other Names: Workshop on Communication Security, 2nd Record Type: Book Extent: 1 online resource (xiii, 141 pages), 27 illustrations, 14 illustrations in color View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Big data technologies for monitoring of computer security : a case study of the Russian Federation /: a case study of the Russian Federation. ([2018]) Other Names: Petrenko, Sergei Record Type: Book Extent: 1 online resource (xxvii, 249 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗