|
|
From inference to influence : applying causal game theory to complex security environments /
|
Vonk, Maarten, dissertant.
|
publisher not identified
|
[2026]
|
Book - Physical
|
2026-04-01 09:32:39
|
|
Unknown
|
|
|
Deepfake and Image Forgery Detection : Cybersecurity, Multimedia Forensics, Image Manipulation.
|
Johnson, Chad.
|
Walter de Gruyter GmbH
|
2026.
|
Book - Electronic
|
2026-03-17 10:00:31
|
Forging; Image processing
|
TK7800
|
|
|
National security and international economic law : restoring balance /
|
Hrynkiv, Olga author
|
Cambridge University Press
|
2026.
|
Book - Electronic
|
2026-03-12 11:36:56
|
World Trade Organization; Foreign trade regulation--International cooperation; Investments, Foreign (International law); Security, International--Economic aspects; National security--Law and legislation; Economic stabilization
|
K3941
|
|
|
Sovereign heritage crime : security, autocracy, and the material past /
|
Maghakyan, Simon, author.
|
Cambridge University Press
|
2026.
|
Book - Electronic
|
2026-03-12 11:36:14
|
Cultural property.; Dictatorship.; Government liability.
|
CC135
|
|
|
Cyber-espionage in international law : silence speaks /
|
Moulin, Thibault, author.
|
Manchester University Press
|
2023.
|
Book - Electronic
|
2026-03-12 11:36:14
|
Cyberterrorism--Law and legislation.; Internet and terrorism.
|
KZ7198
|
|
|
Rethinking settlement and integration : migrants' anchoring in an age of insecurity /
|
Grzymała-Kazłowska, Aleksandra, author.
|
Manchester University Press
|
2020.
|
Book - Electronic
|
2026-03-12 11:36:14
|
Immigrants--Cultural assimilation.; Immigrants--Social conditions.; Polish people--Cultural assimilation--Great Britain.; Ukrainians--Cultural assimilation--Poland.
|
JV6201
|
|
|
Defense of the West : transatlantic security from Truman to Trump /
|
Sloan, Stanley R., author.
|
Manchester University Press
|
2020.
|
Book - Electronic
|
2026-03-12 11:36:13
|
Europe--Foreign relations--United States.; United States--Foreign relations--Europe.; Security, International.
|
D1050
|
|
|
Combating the People's Republic of China's Illegal, Coercive, Aggressive, and Deceptive Behavior in the Indo-Pacific: Hearing Before the Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy of the Committee on Foreign Relations, U.S. Senate, One Hundred Nineteenth Congress, First Session [2025].
|
|
US Government Publishing Office
|
2025.
|
Book - Electronic
|
2026-03-02 14:31:48
|
|
Unknown
|
|
|
Security and Privacy in Social Networks and Big Data : 11th International Symposium, SocialSec 2025, Wuhan, China, December 5–7, 2025, Proceedings /
|
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2026-02-25 22:32:37
|
Computer networks--Security measures.; Cryptography.; Data encryption (Computer science); Data protection.; Application software.; Computer networks.; Mobile and Network Security.; Cryptology.; Data and Information Security.; Computer and Information Systems Applications.; Computer Communication Networks.
|
TK5101
|
|
|
Dangerous alliances : proponents of peace, weapons of war /
|
Weitsman, Patricia A., author.
|
Stanford University Press
|
©2004.
|
Book - Physical
|
2026-02-25 10:43:15
|
World politics--19th century.; World politics--20th century.; Europe--Politics and government--19th century.; Europe--Politics and government--20th century.; World War, 1914-1918--Diplomatic history.; Europe, Eastern--Politics and government--19th century.; Europe--Politics and government--1789-1900.; Politique mondiale--19e siècle.; Équilibre des puissances.; Politique mondiale--20e siècle.; Relations internationales.; Diplomatie.; Guerre mondiale, 1914-1918--Histoire diplomatique.; Europe de l'Est--Politique et gouvernement--19e siècle.; Europe--Politique et gouvernement--20e siècle.; Europe--Politique et gouvernement--1789-1900.; international relations.; diplomacy.; alliances.; Balance of power.; Diplomacy.; Politics and government.; World politics.; Europe; Internationale Politik; Bündnis; Europe.; Alliances.; International relations.; World War I.; Diplomatic history.; World War--(1914-1918); Geschichte 1800-1918.; 1800-1999
|
Unknown
|
|
|
The transatlantic divide : foreign and security policies in the Atlantic alliance from Kosovo to Iraq /
|
|
Manchester University Press
|
2013.
|
Book - Electronic
|
2026-02-17 12:28:48
|
North Atlantic Treaty Organization.; European Security and Defense Policy.; Security, International.; World politics--1989-; United States--Military relations--European Union countries.; European Union countries--Military relations--United States.
|
JZ5587
|
|
|
The official record : oversight, national security and democracy /
|
|
Manchester University Press
|
2024.
|
Book - Electronic
|
2026-02-17 12:28:48
|
Official secrets--Case studies.; Public records--Access control--Case studies.; National security.
|
JF1521.001
|
|
|
I refuse to condemn : resisting racism in times of national security /
|
|
Manchester University Press
|
2020.
|
Book - Electronic
|
2026-02-17 12:28:48
|
Racism.; Racism in popular culture.
|
HT1501
|
|
|
Intelligence and national security policymaking on Iraq : British and American perspectives /
|
|
Manchester University Press
|
2008.
|
Book - Electronic
|
2026-02-17 12:28:48
|
Iraq War, 2003-2011--Military intelligence--United States.; Iraq War, 2003-2011--Military intelligence--Great Britain.; National security--United States--Decision making.; National security--Great Britain--Decision making.; United States--Military relations--Iraq.; Great Britain--Military relations--Iraq.; United States--Military policy.; Great Britain--Military policy.
|
DS70.82
|
|
|
Computer Performance Engineering : 21st European Workshop on Performance Engineering, EPEW 2025, Catania, Italy, June 26, 2025, Revised Selected Papers /
|
Carnevali, Laura.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-02-17 07:41:42
|
Data protection.; Computer science--Mathematics.; Mathematical statistics.; Computer networks.; Computers, Special purpose.; Computer systems.; Application software.; Data and Information Security.; Probability and Statistics in Computer Science.; Computer Communication Networks.; Special Purpose and Application-Based Systems.; Computer System Implementation.; Computer and Information Systems Applications.
|
QA76.766
|
|
|
Explaining famine in the British Empire : agricultural science, food security, and the rise of statistics.
|
Lidwell-Durnin, John
|
Oxford University Press
|
2026.
|
Book - Electronic
|
2026-02-14 09:46:22
|
|
Unknown
|
|
|
Security, Privacy, and Applied Cryptography Engineering : 15th International Conference, SPACE 2025, Guwahati, India, December 16–19, 2025, Proceedings /
|
Karfa, Chandan.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-02-14 06:01:02
|
Data protection.; Computer networks.; Image processing--Digital techniques.; Computer vision.; Data and Information Security.; Computer Communication Networks.; Computer Imaging, Vision, Pattern Recognition and Graphics.
|
QA76.766
|
|
|
Counter-Narratives to Terrorism in Pakistan : Breaking the Cycle /
|
Rao, Munir Ahmad Zia.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-02-13 23:18:40
|
Criminology.; Terrorism.; Political violence.; Organized crime.; Crime--Sociological aspects.; Crime Control and Security.; Terrorism and Political Violence.; Organized Crime.; Asian Criminology.; Crime and Society.
|
Unknown
|
|
|
The early security confederations : from the ancient Greeks to the United Colonies of New England
|
Lister, Frederick K
|
|
20uu
|
Book - Physical
|
2026-02-13 16:16:42
|
|
Unknown
|
|
|
North Korea : politics, security, and human rights /
|
|
Snova
|
[2025]
|
Book - Physical
|
2026-02-12 10:26:56
|
National security--Korea (North); Human rights--Korea (North); Korea (North)--Politics and government.; Droits de l'homme (Droit international)--Corée du Nord.; Corée du Nord--Politique et gouvernement.
|
Unknown
|
|
|
Women and Criminal Justice in Latin America : Between Victimization and Criminalization /
|
Giacomello, Corina.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-02-09 14:00:32
|
Critical criminology.; Criminology.; Identity politics.; Sex.; Political planning.; Social policy.; Critical Criminology.; Crime Control and Security.; Politics and Gender.; Gender Studies.; Public Policy.; Social Policy.
|
HV6001
|
|
|
Network and System Security : 19th International Conference, NSS 2025, Wuhan, China, December 5–7, 2025, Proceedings /
|
Chen, Jiageng.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2026-02-06 14:01:00
|
Computer networks--Security measures.; Data protection.; Mobile and Network Security.; Security Services.
|
TK5101
|
|
|
The New Criminological Critique : Criminology in Times of Financial Totalitarianism /
|
Zaffaroni, Eugenio Raúl.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-02-06 14:00:58
|
Critical criminology.; Criminology.; Crime--Sociological aspects.; Critical Criminology.; Crime Control and Security.; Crime and Society.; Criminology in the Global South.
|
HV6001
|
|
|
Public diplomacy as a contributing factor to solving managing identity-based conflict: Taiwan repositions its identity and security status (2000-2020) /
|
Lin, Yung, dissertant.
|
publisher not identified
|
[2025]
|
Book - Physical
|
2026-02-06 13:38:47
|
|
Unknown
|
|
|
New Perspectives on Global Gender-Based Violence : Digital, Institutional and Inter-Personal Harms /
|
Wilcock, Angela.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-02-03 14:11:14
|
Critical criminology.; Crime.; Technology.; Victims of crimes.; Computer crimes.; Crime--Sociological aspects.; Criminology.; Critical Criminology.; Crime and Technology.; Victimology.; Cybercrime.; Crime and Society.; Crime Control and Security.
|
HV6001
|
|
|
Proceedings of the 2nd Symposium on Smart, Sustainable, and Secure Internet of Things : Proceedings of S4IoT’25 /
|
Trabelsi, Mohamed.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2026-02-03 14:00:23
|
Internet of things.; Telecommunication.; Computer networks--Security measures.; Security systems.; Data protection.; Medical informatics.; Internet of Things.; Communications Engineering, Networks.; Mobile and Network Security.; Security Science and Technology.; Data and Information Security.; Health Informatics.
|
TK5101
|
|
|
Lightweight Cryptography for Security and Privacy : 6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 1–2, 2025, Revised Selected Papers /
|
Savaş, Erkay.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-02-02 13:50:47
|
Cryptography.; Data encryption (Computer science); Data protection.; Coding theory.; Information theory.; Computer storage devices.; Memory management (Computer science); Artificial intelligence.; Cryptology.; Data and Information Security.; Coding and Information Theory.; Computer Memory Structure.; Artificial Intelligence.
|
QA150
|
|
|
The great risk shift : the new economic insecurity and the decline of the American dream /
|
Hacker, Jacob S., author.
|
Oxford University Press
|
[2019]
|
Book - Electronic
|
2026-01-30 13:43:37
|
Economic security--United States.; Risk--United States.; United States--Economic conditions.; American Dream.; États-Unis--Conditions économiques.; BUSINESS & ECONOMICS--Economics--General.; BUSINESS & ECONOMICS--Reference.; American Dream; Economic history; Economic security; Risk; United States; Sécurité économique--États-Unis.; Risque--États-Unis.; Rêve américain.; Conditions économiques--États-Unis.
|
HD7088
|
|
|
Handbook of Blockchain Analytics /
|
Chen, Cathy Yi-Hsuan.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-01-24 13:16:24
|
Statistics.; Financial engineering.; Data protection.; Electronic commerce.; Statistics in Business, Management, Economics, Finance, Insurance.; Financial Technology and Innovation.; Data and Information Security.; e-Commerce and e-Business.
|
Unknown
|
|
|
Evidence-Based Detection, Management and Prevention of Police Misconduct /
|
Cubitt, Timothy.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-01-21 11:01:42
|
Criminology.; Crime--Sociological aspects.; Research Methods in Criminology.; Crime Control and Security.; Crime and Society.
|
HV6001
|
|
|
Gang Networks and the Evolving Security Threat Landscape, Volume 1 : Gang Variability, Gang Transformation and the Threat Multiplier of Gang Networks /
|
Roberts, Ryan J., author.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-01-21 11:01:41
|
Criminology.; Crime Control and Security.; Gangs.
|
Unknown
|
|
|
Freedom and security : the CSCE and the end of the Cold War (1986-1989) /
|
|
Brill
|
2025.
|
Book - Physical
|
2026-01-14 15:57:24
|
Conference on Security and Cooperation in Europe.--Follow-up Meeting--(3rd :--1986-1989 :--Vienna, Austria); Conference on Security and Cooperation in Europe--(1975 :--Helsinki, Finland); Security, International.; European cooperation.; Human rights--Europe.; Europe--Military policy.; Coopération européenne.; Droits de l'homme (Droit international)--Europe.; Cold War.; 1986-1989
|
Unknown
|
|
|
Al-Noor Journal for Information Technology and Cybersecurity.
|
|
Alnoor University
|
|
Journal - Electronic
|
2026-01-12 14:36:05
|
cybersecurity; data protection & privacy; information systems; electronic systems & applications; software engineering & development; artificial intelligence in security
|
Unknown
|
|
|
The Law of Food Security: The Legal Framework for a Sustainable and Equitable Global Food System /
|
Silvee, Sadiya S.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2026-01-12 14:31:57
|
Conflict of laws.; International law.; Comparative law.; Food security.; Food--Safety measures.; Private International Law, International and Foreign Law, Comparative Law.; Food Security.; Food Safety.
|
Unknown
|
|
|
Agri-informatics and Eco-friendly Innovations for a Secure Food Future /
|
Singh, Suraj Kumar.
|
Imprint Springer; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-12 13:07:01
|
Environmental geography.; Food security.; Physical geography.; Geographic information systems.; Integrated Geography.; Food Security.; Sustainability.; Agriculture.; Physical Geography.; Geographical Information System.
|
G142.001
|
|
|
Artificial Intelligence and Crime : Curated Literature Overview on AI, Crime, and Counteraction /
|
Kaucz, Błażej.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:14
|
Crime.; Technology.; Criminology.; Artificial intelligence.; Crime and Technology.; Crime Control and Security.; Artificial Intelligence.
|
Unknown
|
|
|
Financial Cryptography and Data Security : 29th International Conference, FC 2025, Miyakojima, Japan, April 14–18, 2025, Revised Selected Papers, Part II /
|
Garman, Christina.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-01-04 15:07:11
|
Cryptography.; Data encryption (Computer science); Computer networks.; Operating systems (Computers); Application software.; Data protection.; Cryptology.; Computer Communication Networks.; Operating Systems.; Computer and Information Systems Applications.; Data and Information Security.
|
QA150
|
|
|
Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part I /
|
Chen, Rongmao.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2026-01-04 15:07:10
|
Data protection.; Image processing--Digital techniques.; Computer vision.; Computer networks.; Application software.; Computer networks--Security measures.; Cryptography.; Data encryption (Computer science); Data and Information Security.; Computer Imaging, Vision, Pattern Recognition and Graphics.; Computer Communication Networks.; Computer and Information Systems Applications.; Mobile and Network Security.; Cryptology.
|
QA76.766
|
|
|
Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part III /
|
Chen, Rongmao.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2026-01-04 15:07:10
|
Data protection.; Image processing--Digital techniques.; Computer vision.; Computer networks.; Application software.; Computer networks--Security measures.; Cryptography.; Data encryption (Computer science); Data and Information Security.; Computer Imaging, Vision, Pattern Recognition and Graphics.; Computer Communication Networks.; Computer and Information Systems Applications.; Mobile and Network Security.; Cryptology.
|
QA76.766
|
|
|
Governance of the Police in England and Wales, Volume II : Reform and Development of Tripartite Governance 1979–2025 /
|
Joyce, Peter.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:09
|
Criminology--History.; Criminology.; Corporate governance.; Crime--Sociological aspects.; Organized crime.; History of Criminology.; Crime Control and Security.; Corporate Governance.; Crime and Society.; Organized Crime.
|
Unknown
|
|
|
Special topics in policing : critical issues and global perspectives, Volume 4 /
|
|
Imprint Springer; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:09
|
Criminology.; Crime--Sociological aspects.; Crime Control and Security.; Crime and Society.
|
Unknown
|
|
|
Cyberspace Safety and Security : 15th International Symposium, CSS 2025, Hangzhou, China, July 4–7, 2025, Proceedings /
|
Xiang, Yang.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2026-01-04 15:07:09
|
Data protection.; Cryptography.; Data encryption (Computer science); Computers.; Image processing--Digital techniques.; Computer vision.; Artificial intelligence.; Data and Information Security.; Cryptology.; Computing Milieux.; Computer Imaging, Vision, Pattern Recognition and Graphics.; Artificial Intelligence.
|
QA76.766
|
|
|
Understanding Crime Control and Punishment in Lithuania : A Punitive Society? /
|
Dobryninas, Aleksandras.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:08
|
Criminology.; Corrections.; Punishment.; Political sociology.; Crime--Sociological aspects.; Criminal law.; Human rights.; Crime Control and Security.; Prison and Punishment.; Political Sociology.; Crime and Society.; Criminal Law and Criminal Procedure Law.; Politics and Human Rights.
|
Unknown
|
|
|
Transparency in EU Law : From Legal Principles to a Food Sector Analysis /
|
Vanuzzo, Marianna.
|
Imprint Springer; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:04
|
Commercial law.; European Economic Community.; Law.; Food security.; European Economic Law.; Fundamentals of Law.; Food Security.
|
Unknown
|
|
|
Governance of the Police in England and Wales, Volume I : Reforms from the Anglo-Saxon Period to 1979 /
|
Joyce, Peter.
|
Imprint Palgrave Macmillan; Palgrave Macmillan UK
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:04
|
Criminology--History.; Criminology.; Corporate governance.; Crime--Sociological aspects.; Organized crime.; History of Criminology.; Crime Control and Security.; Corporate Governance.; Crime and Society.; Organized Crime.
|
Unknown
|
|
|
Selected Areas in Cryptography – SAC 2025 : 32nd International Conference, Toronto, ON, Canada, August 13–15, 2025, Revised Selected Papers /
|
Boura, Christina.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-01-04 15:07:04
|
Data protection.; Computer networks.; Computer engineering.; Cryptography.; Data encryption (Computer science); Data and Information Security.; Computer Communication Networks.; Computer Engineering and Networks.; Security Services.; Cryptology.
|
QA76.766
|
|
|
Reconceptualizing Exiting and Career Development in Sex Work : Work Like Any Other /
|
Sandy, Larissa.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:03
|
Critical criminology.; Human rights.; Criminology.; Social service.; Social policy.; Sex.; Critical Criminology.; Human Rights.; Crime Control and Security.; Social Work.; Social Policy.; Gender Studies.
|
HV6001
|
|
|
Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II /
|
Chen, Rongmao.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2026-01-04 15:07:03
|
Data protection.; Image processing--Digital techniques.; Computer vision.; Computer networks.; Application software.; Computer networks--Security measures.; Cryptography.; Data encryption (Computer science); Data and Information Security.; Computer Imaging, Vision, Pattern Recognition and Graphics.; Computer Communication Networks.; Computer and Information Systems Applications.; Mobile and Network Security.; Cryptology.
|
QA76.766
|
|
|
Brazilian Cultural Criminology : From Periphery to Centre /
|
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:02
|
Critical criminology.; Criminology.; Organized crime.; Sociology, Urban.; Critical Criminology.; Criminology in the Global South.; Crime Control and Security.; Organized Crime.; Urban Sociology.
|
HV6001
|
|
|
Fuelling the Development of a Caribbean Criminology, Volume I : Crime, Crime Trends and Criminal Justice Reform /
|
Wallace, Wendell C.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2026-01-04 15:07:01
|
Criminology.; Critical criminology.; Crime--Sociological aspects.; Criminology in the Global South.; Critical Criminology.; Crime and Society.; Crime Control and Security.
|
Unknown
|
|
|
Financial Cryptography and Data Security : 29th International Conference, FC 2025, Miyakojima, Japan, April 14–18, 2025, Revised Selected Papers, Part I /
|
Garman, Christina.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2026-01-04 11:00:22
|
Cryptography.; Data encryption (Computer science); Computer networks.; Operating systems (Computers); Application software.; Data protection.; Cryptology.; Computer Communication Networks.; Operating Systems.; Computer and Information Systems Applications.; Data and Information Security.
|
QA150
|
|
|
The Security of Self : A Human-Centric Approach to Cybersecurity /
|
|
University of Ottawa Press
|
2025.
|
Book - Electronic
|
2025-12-19 14:19:48
|
Micro-ordinateurs--Acces--Contrôle.; Securite informatique.; Microcomputers--Access control.; Computer security--Psychological aspects.; Behavioral cybersecurity.; Computer security.; Electronic books.
|
Unknown
|
|
|
Secure distributed machine learning in healthcare : a study on FAIR, compliance and cybersecurity for federated learning /
|
Plug, Ruduan Benjamin Franklin, 1991- dissertant.
|
Print & Bind; publisher not identified
|
[2025]
|
Book - Physical
|
2025-12-19 10:36:03
|
|
Unknown
|
|
|
Information Systems Security : 21st International Conference, ICISS 2025, Indore, India, December 16–20, 2025, Proceedings /
|
Hubballi, Neminath.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-12-15 13:12:18
|
Data protection.; Computer engineering.; Computer networks.; Data and Information Security.; Computer Engineering and Networks.; Computer Communication Networks.
|
QA76.766
|
|
|
The sociology of cybersecurity : an ethnography of a science and the profession /
|
Zaród, Marcin, author.
|
Routledge
|
2026
|
Book - Electronic
|
2025-12-15 13:00:33
|
Computer security--Social aspects.; Sécurité informatique--Aspect social.
|
QA76.766
|
|
|
Queering women, peace and security : expanding feminist approaches to gender in peacebuilding /
|
Hagen, Jamie J., author.
|
Oxford University Press
|
[2025]
|
Book - Electronic
|
2025-12-11 10:00:32
|
Women in peace-building.; Sexual minorities--Political activity.; Politics and Government.; Politics & government.
|
JZ5532.001
|
|
|
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part IV /
|
Hanaoka, Goichiro.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-12-11 10:00:32
|
Cryptography.; Data encryption (Computer science); Computer networks.; Application software.; Data protection.; Computer networks--Security measures.; Cryptology.; Computer Communication Networks.; Computer and Information Systems Applications.; Security Services.; Mobile and Network Security.
|
QA150
|
|
|
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part III /
|
Hanaoka, Goichiro.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-12-11 10:00:32
|
Cryptography.; Data encryption (Computer science); Computer networks.; Application software.; Data protection.; Computer networks--Security measures.; Cryptology.; Computer Communication Networks.; Computer and Information Systems Applications.; Security Services.; Mobile and Network Security.
|
QA150
|
|
|
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part VIII /
|
Hanaoka, Goichiro.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-12-11 10:00:32
|
Cryptography.; Data encryption (Computer science); Computer networks.; Application software.; Data protection.; Computer networks--Security measures.; Cryptology.; Computer Communication Networks.; Computer and Information Systems Applications.; Security Services.; Mobile and Network Security.
|
QA150
|
|
|
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part VII /
|
Hanaoka, Goichiro.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-12-11 10:00:32
|
Cryptography.; Data encryption (Computer science); Computer networks.; Application software.; Data protection.; Computer networks--Security measures.; Cryptology.; Computer Communication Networks.; Computer and Information Systems Applications.; Security Services.; Mobile and Network Security.
|
QA150
|
|
|
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part II /
|
Hanaoka, Goichiro.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-12-11 10:00:31
|
Cryptography.; Data encryption (Computer science); Computer networks.; Application software.; Data protection.; Computer networks--Security measures.; Cryptology.; Computer Communication Networks.; Computer and Information Systems Applications.; Security Services.; Mobile and Network Security.
|
QA150
|
|
|
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part I /
|
Hanaoka, Goichiro.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-12-11 10:00:31
|
Cryptography.; Data encryption (Computer science); Computer networks.; Application software.; Data protection.; Computer networks--Security measures.; Cryptology.; Computer Communication Networks.; Computer and Information Systems Applications.; Security Services.; Mobile and Network Security.
|
QA150
|
|
|
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V /
|
Hanaoka, Goichiro.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-12-11 10:00:30
|
Cryptography.; Data encryption (Computer science); Computer networks.; Application software.; Data protection.; Computer networks--Security measures.; Cryptology.; Computer Communication Networks.; Computer and Information Systems Applications.; Security Services.; Mobile and Network Security.
|
QA150
|
|
|
Financial security and household life insurance : Bridging the gap. /
|
Dębicka, Joanna.
|
|
2025.
|
Book - Electronic
|
2025-12-11 00:01:35
|
Nonfiction.; Business.
|
Unknown
|
|
|
The Policing Gap in NATO Operations : Defining the complexity of Internal Security Architecture /
|
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-12-10 12:41:48
|
Criminology.; Peace.; Crime Control and Security.; Peace and Conflict Studies.
|
Unknown
|
|
|
Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part VI /
|
Hanaoka, Goichiro.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-12-10 12:14:21
|
Cryptography.; Data encryption (Computer science); Computer networks.; Application software.; Data protection.; Computer networks--Security measures.; Cryptology.; Computer Communication Networks.; Computer and Information Systems Applications.; Security Services.; Mobile and Network Security.
|
QA150
|
|
|
Quantum Technologies : Trends and Implications for Cyber Defense /
|
Jang-Jaccard, Julian.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-12-09 00:22:14
|
Data protection.; Quantum computers.; Data and Information Security.; Quantum Computing.
|
QA76.766
|
|
|
Theory of Cryptography : 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part IV /
|
Applebaum, Benny.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-12-08 14:00:29
|
Cryptography.; Data encryption (Computer science); Data protection.; Computer networks--Security measures.; Computer networks.; Computer systems.; Data structures (Computer science); Information theory.; Cryptology.; Security Services.; Mobile and Network Security.; Computer Communication Networks.; Computer System Implementation.; Data Structures and Information Theory.
|
QA150
|
|
|
Theory of Cryptography : 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part III /
|
Applebaum, Benny.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-12-06 08:01:14
|
Cryptography.; Data encryption (Computer science); Data protection.; Computer networks--Security measures.; Computer networks.; Computer systems.; Data structures (Computer science); Information theory.; Cryptology.; Security Services.; Mobile and Network Security.; Computer Communication Networks.; Computer System Implementation.; Data Structures and Information Theory.
|
QA150
|
|
|
Theory of Cryptography : 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II /
|
Applebaum, Benny.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-12-05 10:00:42
|
Cryptography.; Data encryption (Computer science); Data protection.; Computer networks--Security measures.; Computer networks.; Computer systems.; Data structures (Computer science); Information theory.; Cryptology.; Security Services.; Mobile and Network Security.; Computer Communication Networks.; Computer System Implementation.; Data Structures and Information Theory.
|
QA150
|
|
|
Theory of Cryptography : 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part I /
|
Applebaum, Benny.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-12-05 10:00:42
|
Cryptography.; Data encryption (Computer science); Data protection.; Computer networks--Security measures.; Computer networks.; Computer systems.; Data structures (Computer science); Information theory.; Cryptology.; Security Services.; Mobile and Network Security.; Computer Communication Networks.; Computer System Implementation.; Data Structures and Information Theory.
|
QA150
|
|
|
Advances in Information and Computer Security : 20th International Workshop on Security, IWSEC 2025, Fukuoka, Japan, November 25–27, 2025, Proceedings /
|
Cid, Carlos.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-11-28 10:00:44
|
Data protection.; Application software.; Computers.; Computer networks.; Data and Information Security.; Computer and Information Systems Applications.; Computing Milieux.; Computer Communication Networks.
|
QA76.766
|
|
|
Cyberbiosecurity: A Matter of International Peace and Security?.
|
Mazeaud
|
Geneva UNIDIR
|
2025.
|
Book - Electronic
|
2025-11-28 08:19:17
|
|
Unknown
|
|
|
Identity-Based Mass Violence in Urban Contexts : Uncovered /
|
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-11-27 10:08:34
|
Criminal behavior.; Criminology.; Peace.; Victims of crimes.; Urban policy.; Social justice.; Criminal Behavior.; Crime Control and Security.; Peace and Conflict Studies.; Victimology.; Urban Policy.; Social Justice.
|
Unknown
|
|
|
Cyber Security, Cryptology, and Machine Learning : 9th International Symposium, CSCML 2025, Be'er Sheva, Israel, December 4–5, 2025, Proceedings /
|
Akavia, Adi.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-11-27 10:00:34
|
Data protection.; Application software.; Computer networks.; Machine learning.; Cryptography.; Data encryption (Computer science); Data and Information Security.; Computer and Information Systems Applications.; Computer Communication Networks.; Machine Learning.; Cryptology.
|
QA76.766
|
|
|
Cybersecurity : Cyber Defense, Privacy and Cyber Warfare.
|
Dimitoglou, George.
|
Walter de Gruyter GmbH
|
2025.
|
Book - Electronic
|
2025-11-25 10:00:41
|
Computer security; Computer networks--Security measures
|
QA76.766
|
|
|
Recent Trends in Artificial Intelligence and Data Sciences : Select Proceedings of the 15th International Conference—CONFLUENCE 2025 /
|
Kumar, Sumit.
|
Imprint Springer; Springer Nature Singapore
|
2025.
|
Book - Electronic
|
2025-11-23 11:02:06
|
Computational intelligence.; Data structures (Computer science); Information theory.; Artificial intelligence.; Database management.; Data protection.; Computational Intelligence.; Data Structures and Information Theory.; Artificial Intelligence.; Database Management System.; Data and Information Security.
|
Q300
|
|
|
Acid Attacks in India : Representations of Survivors and Their Recovery /
|
Mittal, Shalini.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2025-11-21 07:55:29
|
Crime--Sociological aspects.; Criminal behavior.; Victims of crimes.; Criminology.; Crime and Society.; Criminal Behavior.; Victimology.; Crime Control and Security.; Asian Criminology.; Criminology in the Global South.
|
Unknown
|
|
|
Generative AI in Cybersecurity /
|
Sikos, Leslie F.
|
Imprint Springer; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2025-11-21 07:55:26
|
Artificial intelligence.; Computer networks--Security measures.; Artificial Intelligence.; Mobile and Network Security.
|
Unknown
|
|
|
Council unbound : the growth of UN decision making on conflict and postconflict issues after the Cold War /
|
Matheson, Michael John, author.
|
United States Institute of Peace Press
|
2006.
|
Book - Physical
|
2025-11-20 11:24:48
|
Nations Unies--Forces de maintien de la paix.; Sanctions (Droit international); Intervention (Droit international); Agression (Droit international); United Nations; United Nations.--Security Council; Decision making; Peacekeeping forces; United Nations.--Security Council--Decision making.; United Nations--Peacekeeping forces.; Sanctions (International law); Intervention (International law); Aggression (International law); United Nations.; Security Council.; Peacekeeping.; Sanctions.; Intervention.; Aggression.; Decision-making.; International peace and security.
|
Unknown
|
|
|
Cryptology and Network Security : 24th International Conference, CANS 2025, Osaka, Japan, November 17–20, 2025, Proceedings /
|
Kim, Yongdae.
|
Imprint Springer; Springer Nature Singapore
|
2026.
|
Book - Electronic
|
2025-11-16 11:00:35
|
Cryptography.; Data encryption (Computer science); Computer networks.; Computer networks--Security measures.; Data protection.; Application software.; Cryptology.; Computer Communication Networks.; Mobile and Network Security.; Data and Information Security.; Computer and Information Systems Applications.
|
QA150
|
|
|
Studying Russia and its wars : academic stocktaking in times of insecurity /
|
|
Brill
|
2026.
|
Book - Electronic
|
2025-11-15 20:03:10
|
Russo-Ukrainian War, 2014-; International relations.; Russia (Federation)--Foreign relations.; Russia (Federation)--Military policy.; Russia (Federation)--Study and teaching.
|
JZ1153.001
|
|
|
Sustainable development and water security : towards achieving a water-secure world /
|
Kay, Melvyn, author.
|
Agenda Publishing Limited
|
2025.
|
Book - Electronic
|
2025-11-12 14:23:17
|
Water security.; Sustainable development.
|
HD1635
|
|
|
Global crisis and insecurity : the human condition, darkly /
|
James, Paul 1958- author (Paul Warren),
|
Cambridge University Press
|
2025.
|
Book - Electronic
|
2025-11-12 14:23:15
|
Human security; Crises; Social change; World politics
|
JC571
|
|
|
A climate of truth : why we need it and how to get it /
|
Berners-Lee, Mike, author.
|
Cambridge University Press
|
2025.
|
Book - Electronic
|
2025-11-12 12:46:04
|
Global environmental change.; Climatic changes.; Human security.; Environmental ethics.; Honesty.; Ethics.
|
GE90.001
|
|
|
Inside the radicalized mind : the neuropolitics of terrorism and violent extremism /
|
Howard, Tiffiany, author.
|
Cambridge University Press
|
2025.
|
Book - Electronic
|
2025-11-12 12:46:03
|
Internet and terrorism.; Terrorists--Recruiting--Technological innovations.; Terroism--Psychological aspects.; Terrorism--Computer network resources.; Radicalization--Computer network resources.
|
HV6251
|
|
|
Sustaining development in small islands : climate change, geopolitical security, and the permissive liberal order /
|
Bishop, Matthew Louis, 1979- author.
|
Cambridge University Press
|
2024.
|
Book - Electronic
|
2025-11-12 12:28:27
|
Developing island countries--Economic conditions.
|
HC10
|
|
|
Radical food geographies : power, knowledge, and resistance /
|
|
Bristol University Press
|
2024.
|
Book - Electronic
|
2025-11-12 12:28:27
|
Food supply.; Food security.
|
HD9000
|
|
|
Climate Crisis in South and East Asia : Analyzing Cross Cutting Issues and Sustainable Solutions from Gender Perspective /
|
Abedin, Anwarul.
|
Imprint Springer; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2025-11-10 14:00:26
|
Climatology.; Health.; Sex.; Food security.; Bioclimatology.; Social sciences.; Climate Sciences.; Gender and Health.; Sustainability.; Food Security.; Climate Change Ecology.; Society.
|
Unknown
|
|
|
Financial Cryptography and Data Security. FC 2025 International Workshops : CAAW 2025 and WTSC 2025, Miyakojima, Japan, April 18, 2025, Revised Selected Papers, Part I /
|
Haslhofer, Bernhard.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-11-09 11:00:39
|
Cryptography.; Data encryption (Computer science); Application software.; Computer networks.; Operating systems (Computers); Data protection.; Cryptology.; Computer and Information Systems Applications.; Computer Communication Networks.; Operating Systems.; Data and Information Security.
|
QA150
|
|
|
Financial Cryptography and Data Security. FC 2025 International Workshops : CoDecFin, FinTeAchin, VOTING, Miyakojima, Japan, April 18, 2025, Revised Selected Papers, Part II /
|
Haslhofer, Bernhard.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-11-09 11:00:37
|
Cryptography.; Data encryption (Computer science); Application software.; Computer networks.; Operating systems (Computers); Data protection.; Cryptology.; Computer and Information Systems Applications.; Computer Communication Networks.; Operating Systems.; Data and Information Security.
|
QA150
|
|
|
Cybersecurity Unlocked : Cryptography, Network Security, Data Protection.
|
Chander, Bhanu.
|
Walter de Gruyter GmbH
|
2025.
|
Book - Electronic
|
2025-11-08 01:38:09
|
Computer security; Computer networks--Security measures
|
QA76.766
|
|
|
Guarding wealth but living in poverty : the working conditions of Namibia's security guards /
|
Shindondola-Mote, Hilma, author.
|
Labour Resource and Research Institute
|
July 2012.
|
Book - Physical
|
2025-11-07 12:34:21
|
Police, Private--Salaries, etc.--Namibia.; Private security services--Namibia.; Work environment--Namibia.; Police privée--Namibie--Traitements, indemnités, etc.; Services privés de sécurité--Namibie.; Police, Private--Salaries, etc.; Private security services.; Work environment.; Namibia; Namibia.; private security services.; working conditions.; work environment.
|
Unknown
|
|
|
The Oxford handbook of national security intelligence /
|
|
Oxford University Press
|
[2025]
|
Book - Electronic
|
2025-11-06 09:50:51
|
Intelligence service.; National security.; Security, International.; Service des renseignements.; Intelligence service; National security; Security, International
|
JF1521.001
|
|
|
Energy Informatics : First Nordic Energy Informatics Academy Conference, EIA Nordic 2025, Stockholm, Sweden, August 20–22, 2025, Proceedings, Part II /
|
Martinac, Ivo.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-11-04 10:00:41
|
Application software.; Artificial intelligence.; Data protection.; Computer and Information Systems Applications.; Artificial Intelligence.; Data and Information Security.
|
QA76.75
|
|
|
Energy Informatics : First Nordic Energy Informatics Academy Conference, EIA Nordic 2025, Stockholm, Sweden, August 20–22, 2025, Proceedings, Part I /
|
Martinac, Ivo.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-11-04 10:00:39
|
Application software.; Artificial intelligence.; Data protection.; Computer and Information Systems Applications.; Artificial Intelligence.; Data and Information Security.
|
QA76.75
|
|
|
Information Security : 28th International Conference, ISC 2025, Seoul, South Korea, October 20–22, 2025, Proceedings /
|
Cha, Sang Kil.
|
Imprint Springer; Springer Nature Switzerland
|
2026.
|
Book - Electronic
|
2025-11-03 14:00:35
|
Data protection.; Computer engineering.; Computer networks.; Cryptography.; Data encryption (Computer science); Computer networks--Security measures.; Data and Information Security.; Computer Engineering and Networks.; Cryptology.; Mobile and Network Security.
|
QA76.766
|
|
|
Revolutionizing Agri-food Systems : Sustainability, Health, and Innovation /
|
Thakur, Monika.
|
Imprint Springer; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2025-11-02 14:56:30
|
Agriculture--Economic aspects.; Food security.; Sustainability.; Agricultural Economics.; Food Security.
|
GE195
|
|
|
Hate Crime Perpetrators: New Perspectives from Theory, Research and Practice, Volume II : Developing Responses to Hate in Online and Offline Locations /
|
Garland, Jon.
|
Imprint Palgrave Macmillan; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2025-11-02 11:00:56
|
Critical criminology.; Social justice.; Criminal law.; Criminal behavior.; Victims of crimes.; Criminology.; Critical Criminology.; Social Justice.; Criminal Law and Criminal Procedure Law.; Criminal Behavior.; Victimology.; Crime Control and Security.
|
HV6001
|
|
|
Edible Flowers: Source of Phytonutrients, Valorization and Technological Advancements /
|
Poonia, Amrita.
|
Imprint Springer; Springer Nature Switzerland
|
2025.
|
Book - Electronic
|
2025-11-02 11:00:55
|
Food science.; Food security.; Food--Analysis.; Chemistry.; Food Science.; Food Security.; Food Chemistry.
|
Unknown
|