Computer networks -- Security measures -- Examinations. : Hargreaves, Brett,
IMPLEMENTING MICROSOFT AZURE ARCHITECT TECHNOLOGIES [electronic resource] : az-303 exam prep and beyo
QA76.585
Bestseller
2020
Computer networks -- Security measures -- Examinations, questions, etc. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99001543
Security+ study guide & DVD training system / [Michael Cross [and others].
TK5105.59 .S43 2007eb
Bestseller
2007
computer networks security measures examinations study guides
CCNA security 210-260 certification guide : build your knowledge of network security and pass your CC
TK5105.59
Bestseller
2018
CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 t
TK5105.59
Bestseller
2020
CISSP in 21 days / M.L. Srinivasan.
QA76.3 .S75 2008eb
Bestseller
2008
CISSP in 21 days : boost your confidence and get the competitive edge you need to crack the exam in j
QA76.3
Bestseller
2016
5 additional entries
Computer networks -- Security measures -- Fiction. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99001562 : Shein, Rob.
Zero day exploit : countdown to darkness / Rob Shein ; Marcus H. Sachs, technical editor.
PS3619.H45 Z47 2004eb
Bestseller
2004
Computer networks -- Security measures -- Germany. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n80125931-781 : Germany.
Defense : information exchange : memorandum of understanding between the United States of America and
E-Gov Document
2012
Computer networks -- Security measures -- Government policy.
At the nexus of cybersecurity and public policy : some basic concepts and issues / David Clark, Thoma
QA76.9.A25 .A884 2014eb
Bestseller
2014
Cyber security and the politics of time / Tim Stevens.
JZ1254 .S74 2015eb
Bestseller
2015
Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones.
TK5105.59 .C364 2019eb
Bestseller
2019
Cybersecurity : public sector threats and responses / [edited by] Kim J. Andreasson.
TK5105.59 .C927 2012
;
Moore Stacks:Available
Book
2012
Computer networks -- Security measures -- Government policy -- United States.
Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T
KF27 .S6442 2011b
E-Gov Document
2012
Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T
Book
2012
Cybersecurity : Executive Order 13636 and the critical infrastructure framework / Anastacia D'Ambrosi
U163
Bestseller
2014
Cybersecurity : preventing terrorist attacks and protecting privacy in cyberspace : hearing before th
KF26 .J87465 2009d
E-Gov Document
2010
4 additional entries
Computer networks -- Security measures -- Handbooks, manuals, etc.
Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / Jason Andress, Steve Winte
U163 .A64 2014eb
Bestseller
2014
Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi
TK5105.59 .H3533 2012
Bestseller
2012
Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering b
TK5105.59
Bestseller
2012
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--fr
TK5105.59
Bestseller
2016
2 additional entries
Computer networks -- Security measures -- History. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99005024 : Stewart, Andrew,
A vulnerable system the history of information security in the computer age / Andrew J. Stewart.
QA76.9.A25 S755 2021
Bestseller
2021
Computer networks -- Security measures -- International cooperation. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00006352 : Singapore.
Defense : cooperation : agreement between the United States of America and Singapore; signed at Singa
E-Gov Document
2011
Computer networks -- Security measures -- Korea (South) / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n79126802-781 : Korea (South)
Defense : cooperation : memorandum of understanding between the United States of America and the Repu
E-Gov Document
2012
Computer networks -- Security measures -- Law and legislation -- United States. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99004848 https://id.loc.gov/authorities/names/n78095330-781 : United States.
Review of the Department of Homeland Security's implementation of the Cybersecurity Act of 2015 / Off
E-Gov Document
2016
Computer networks -- Security measures -- Management.
Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from
QA76.9.A25
Bestseller
2019
Learn Ansible : automate cloud, security, and network infrastructure using Ansible 2.x / Russ McKendr
T58.5
Bestseller
2018
Computer networks -- Security measures -- Poland. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n79131071-781 : Poland.
Defense : cooperation : Agreement between the United States of America and Poland, Signed at Warsaw,
E-Gov Document
2012
Computer networks -- Security measures -- Quality control. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00005852 : Mehan, Julie E.
CyberWar, CyberTerror, CyberCrime.
HV6773 .M44 2008eb
Bestseller
2008
Computer networks -- Security measures -- Research -- Government policy -- United States. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh2002006576 https://id.loc.gov/authorities/subjects/sh99005269 https://id.loc.gov/authorities/names/n78095330-781
Federal cybersecurity : strategy and implementation for research and development / Cory Medina, edito
TK5105.59 .F43 2016
Bestseller
2016
Computer networks -- Security measures -- Social aspects. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00002758 : National Academies of Sciences, Engineering, and Medicine (U.S.).
Decrypting the encryption debate : a framework for decision makers / Committee on Law Enforcement and
QA76.9.A25 N37 2018
Bestseller
2018
Computer networks -- Security measures -- Software.
Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade ant
QA76.76.C68 Y44 2021
Bestseller
2021
Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers :
QA76.9.A25 G45 2007eb
Bestseller
2007
Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRTG / Eric Seagren ; Wes No
TK5105.59 S43 2006eb
Bestseller
2006
Zabbix : enterprise network montioring made easy : learn how to gather detailed statistics and data w
TK5105.5
Bestseller
2017
Computer networks -- Security measures -- Standards.
CyberWar, CyberTerror, CyberCrime.
HV6773 .M44 2008eb
Bestseller
2008
Implementing the ISO/IEC 27001 ISMS standard / Edward Humphreys.
QA76.9.A25 H855 2016
Bestseller
2016
Computer networks -- Security measures -- Study and teaching. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh2001008697
Research anthology on advancements in cybersecurity education / Information Resources Management Asso
Bestseller
2022
Computer networks -- Security measures -- Testing.
BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing t
QA76.9.A25 R36 2011eb
Bestseller
2011
BackTrack : Testing Wireless Network Security.
TK5103.2
Bestseller
2013
Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hack
QA76.9.A25
Bestseller
2019
Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration
QA76.9.A25 S56 2012eb
Bestseller
2012
2 additional entries
Computer networks -- Security measures -- United States.
Additional controls can enhance the security of the automated commercial environment system.
E-Gov Document
2008
Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex.
UA23 .B586 2014
Bestseller
2014
Byte wars : the impact of September 11 on information technology / Ed Yourdon.
QA76.9.A25 Y68 2002
;
Moore Stacks:Available
Book
2002
Challenges remain in DHS' efforts to secure control systems.
E-Gov Document
2009
65 additional entries
Computer networks -- Security measures -- United States -- 21st century. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh2002012478 : Ablon, Lillian,
Zero days, thousands of nights : the life and times of zero-day vulnerabilities and their exploits /
QA76.76.C68 A25 2017eb online
Bestseller
2017
Computer networks -- Security measures -- United States -- Congresses. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh99001533
Professionalizing the nation's cybersecurity workforce? : criteria for decision-making / Committee on
QA76.9.C92 P764 2013 e-book
Bestseller
2013
Computer networks -- Security measures -- United States -- Periodicals.
Issue review / the President's National Security Telecommunications Advisory Committee (NSTAC).
TK5105.59 .I6
;
Moore Stacks:Available
Book
1997
Issue review / the President's National Security Telecommunications Advisory Committee (NSTAC).
E-Gov Document
1997
Computer networks -- Security measures -- United States -- Planning.
The other quiet professionals : lessons for future cyber forces from the evolution of special forces
U163 .P385 2014eb
Bestseller
2014
Redefining information warfare boundaries for an Army in a wireless world / Isaac R. Porche III, Chri
UA23
Bestseller
2013
Computer networks -- Security measures -- United States -- States. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh2001008678 : United States.
Cybersecurity State Coordinator Act of 2020 : report of the Committee on Homeland Security and Govern
KF31 .H65 2020v
E-Gov Document
2020
computer networks simulation methods : Márquez Díaz, José,
Modelado y simulación de redes de computadores : aplicación de QoS con Opnet Modeler / José Márquez D
QA76.9.C65 ebook
Bestseller
2013
Computer Networks Small Business
Getting your business wired : using computer networking and the internet to grow your business / Will
HD30.385 .K54 1999
;
Moore Stacks:Available
Book
1999
Getting your business wired : using computer networking and the internet to grow your business / Will
HD30.385 .K54 1999eb
Bestseller
1999
Impact of e-commerce on consumers and small firms / edited by Salvatore Zappal?a and Colin Gray.
HF5548.32 .I46 2006eb
Bestseller
2006
Microsoft Office live small business : beginner's guide : build and customize your small business web
HF5548.4.M537 2009eb
Bestseller
2009
Computer Networks Small Business Security Measures
Federal government and small businesses : promoting greater information sharing for stronger cybersec
KF27 .S6 2017u
E-Gov Document
2018
Making Available Information Now to Strengthen Trust and Resilience and Enhance Enterprise Technology
KF31 .C69 2017r
E-Gov Document
2017
Computer Networks Small Business Security Measures United States
Cyber crime : an existential threat to small business : hearing before the Committee on Small Busines
KF26 .S6 2019d
E-Gov Document
2019
Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T
KF27 .S6442 2011b
E-Gov Document
2012
Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T
Book
2012
Foreign cyber threats : small business, big target : hearing before the Committee on Small Business,
KF27 .S6 2016o
E-Gov Document
2017
7 additional entries
Computer Networks Small Business Security Measures United States Costs
Foreign cyber threats : small business, big target : hearing before the Committee on Small Business,
KF27 .S6 2016o
E-Gov Document
2017
Small business information sharing : combating foreign cyber threats : hearing before the Committee o
KF27 .S6 2017w
E-Gov Document
2018
Computer networks -- Social aspects.
An aesthesia of networks : conjunctive experience in art and technology / Anna Munster.
QA76.9.C66 M857 2013eb
Bestseller
2013
Being digital / Nicholas Negroponte.
TK5103.7 .N43 1995
;
Moore Stacks:Available
Book
1995
Building virtual communities : learning and change in cyberspace / edited by K. Ann Renninger, Wesley
TK5105.83 .B85 2002eb
Bestseller
2002
Community networks : lessons from Blacksburg, Virginia / Andrew Michael Cohill, Andrea L. Kavanaugh,
TK5105.83 .C66 1999eb
Bestseller
1999
26 additional entries
Computer networks -- Social aspects -- Canada. / https://id.loc.gov/authorities/subjects/sh2008101318 https://id.loc.gov/authorities/names/n79007233-781
Connecting Canadians : investigations in community informatics / edited by Andrew Clement, Michael Gu
HN110.Z9 I563 2011
Bestseller
2012
Computer networks -- Social aspects -- Forecasting.
Divining a digital future : mess and mythology in ubiquitous computing / Paul Dourish and Genevieve B
QA76.5915 .D68 2011eb
Bestseller
2011
Imagining the internet : personalities, predictions, perspectives / Janna Quitney Anderson.
HM851 .A63 2005
;
Moore Stacks:Available
Book
2005
Imagining the internet : personalities, predictions, perspectives / Janna Quitney Anderson.
HM851 .A63 2005eb
Bestseller
2005
Computer networks -- Social aspects -- India -- Almora. / https://id.loc.gov/authorities/subjects/sh2008101318 https://id.loc.gov/authorities/names/n89250403-781 : Arora, Payal.
Dot com mantra : social computing in the Central Himalayas / by Payal Arora.
HN690.A455 A76 2010eb
Bestseller
2010
Computer networks -- Software.
Cassandra high performance cookbook / Edward Capriolo.
QA76.9.D3 C37 2011
Bestseller
2011
Learning VMware NSX - Second Edition.
T55.4-60.8
Bestseller
2017
Linux Administration Cookbook : Insightful Recipes to Work with System Administration Tasks on Linux.
QA76.76.O63 .D436 2018
Bestseller
2018
Linux networking cookbook / Gregory Boyce.
TK5105.5
Bestseller
2016
Computer networks -- Soviet Union -- History. / https://id.loc.gov/authorities/subjects/sh85029513 https://id.loc.gov/authorities/names/n80126312-781 https://id.loc.gov/authorities/subjects/sh99005024 : Peters, Benjamin,
How not to network a nation : the uneasy history of the Soviet internet / Benjamin Peters.
TK5102.3.S68 P48 2016eb
Bestseller
2016
Computer networks -- Standards.
High-performance data network design : design techniques and tools / Tony Kenyon.
TK5105.5 .K45 2002eb
Bestseller
2002
OSI explained : end-to-end computer communication standards / John Henshall and Sandy Shaw.
TK5105.5 .H47 1988
;
Moore Stacks:Available
Book
1988
Computer networks -- Standards -- Economic aspects. / https://id.loc.gov/authorities/subjects/sh91001977 https://id.loc.gov/authorities/subjects/sh99005484
Opening standards : the global politics of interoperability / Laura DeNardis, editor.
TK5105.55 .O65 2011eb
Bestseller
2011
Computer networks -- Standards -- Government policy. / https://id.loc.gov/authorities/subjects/sh91001977 https://id.loc.gov/authorities/subjects/sh99005269
Opening standards : the global politics of interoperability / Laura DeNardis, editor.
TK5105.55 .O65 2011eb
Bestseller
2011
Computer networks -- Standards -- Political aspects. / https://id.loc.gov/authorities/subjects/sh91001977 https://id.loc.gov/authorities/subjects/sh00005651
Opening standards : the global politics of interoperability / Laura DeNardis, editor.
TK5105.55 .O65 2011eb
Bestseller
2011
Computer networks -- Standards -- United States -- Evaluation. / https://id.loc.gov/authorities/subjects/sh91001978 https://id.loc.gov/authorities/subjects/sh00005674 : United States.
DHS must address Internet Protocol Version 6 challenges.
E-Gov Document
2008
Computer networks -- Statistics -- Congresses. / https://id.loc.gov/authorities/subjects/sh85029513 https://id.loc.gov/authorities/subjects/sh99001414 https://id.loc.gov/authorities/subjects/sh99001533
Proceedings of a Workshop on Statistics on Networks / Scott T. Weidman, editor ; Committee on Applied
QA276.A1 P76 2007eb
Bestseller
2007
Computer Networks Tax Administration And Procedure Security Measures United States : United States.
Improved controls are needed to ensure that all planned corrective actions for security weaknesses ar
E-Gov Document
2013
Computer Networks Teams In The Workplace
The virtual edge : embracing technology for distributed project team success / Margery Mayer.
HD66.2 .M39 2010eb
Bestseller
2010
Working virtually : leading your organization and team, and advancing your personal career, in a mobi
HD30.2122 .H644 2017
Bestseller
2017
Working virtually : managing people for successful virtual teams and organizations / Trina Hoefling.
HD30.2122 .H63 2003eb
Bestseller
2003
Computer networks -- Textbooks. / https://id.loc.gov/authorities/subjects/sh85029513 https://id.loc.gov/authorities/subjects/sh99001753 : Dixit, V. S.
Essentials of Computer Networks, Internet and Database Technologies.
TK5105.5
Bestseller
2012
Computer Networks Trans Union U S Security Measures
Consumer data security and the credit bureaus : hearing before the Committee on Banking, Housing, and
KF26 .B39 2017t
E-Gov Document
2018
Examining the Equifax data breach : hearing before the Committee on Financial Services, U.S. House of
KF27 .F55 2017g
E-Gov Document
2018
Computer Networks Transportation Security Measures : D'Anna, Gloria D.,
Cybersecurity for commercial vehicles / edited and written by Gloria D. D'Anna ; with co-authors in o
TL272.53 .D36 2019eb
Bestseller
2019
Computer Networks Tribal Government Security Measures United States
State and Local Government Cybersecurity Act of 2019 : report of the Committee on Homeland Security a
KF31 .H65 2019y
E-Gov Document
2019
State and Local Government Cybersecurity Act of 2021 : report of the Committee on Homeland Security a
KF31 .H65 2021m
E-Gov Document
2021
Save Marked Records
Save to List