Skip to content
You are not logged in |Login  
     
Limit search to available items
Nearby Subjects are:
Result page:  Prev Next  
Mark   Media Year
Computer networks -- Security measures -- Examinations. : Hargreaves, Brett,     
      IMPLEMENTING MICROSOFT AZURE ARCHITECT TECHNOLOGIES [electronic resource] : az-303 exam prep and beyo QA76.585   Bestseller
BestsellerE-book
2020
Computer networks -- Security measures -- Examinations, questions, etc. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99001543     
      Security+ study guide & DVD training system / [Michael Cross [and others]. TK5105.59 .S43 2007eb   Bestseller
BestsellerE-book
2007
computer networks security measures examinations study guides    
      CCNA security 210-260 certification guide : build your knowledge of network security and pass your CC TK5105.59   Bestseller
BestsellerE-book
2018
      CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 t TK5105.59   Bestseller
BestsellerE-book
2020
      CISSP in 21 days / M.L. Srinivasan. QA76.3 .S75 2008eb   Bestseller
BestsellerE-book
2008
      CISSP in 21 days : boost your confidence and get the competitive edge you need to crack the exam in j QA76.3   Bestseller
BestsellerE-book
2016
5 additional entries    
Computer networks -- Security measures -- Fiction. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99001562 : Shein, Rob.     
      Zero day exploit : countdown to darkness / Rob Shein ; Marcus H. Sachs, technical editor. PS3619.H45 Z47 2004eb   Bestseller
BestsellerE-book
2004
Computer networks -- Security measures -- Germany. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n80125931-781 : Germany.     
      Defense : information exchange : memorandum of understanding between the United States of America and   E-Gov Document 2012
Computer networks -- Security measures -- Government policy.    
      At the nexus of cybersecurity and public policy : some basic concepts and issues / David Clark, Thoma QA76.9.A25 .A884 2014eb   Bestseller
BestsellerE-book
2014
      Cyber security and the politics of time / Tim Stevens. JZ1254 .S74 2015eb   Bestseller
BestsellerE-book
2015
      Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones. TK5105.59 .C364 2019eb   Bestseller
BestsellerE-book
2019
      Cybersecurity : public sector threats and responses / [edited by] Kim J. Andreasson. TK5105.59 .C927 2012 ; Moore Stacks:Available   book
BookPrinted Material
2012
Computer networks -- Security measures -- Government policy -- United States.    
      Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T KF27 .S6442 2011b   E-Gov Document 2012
      Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T   book
BookPrinted Material
2012
      Cybersecurity : Executive Order 13636 and the critical infrastructure framework / Anastacia D'Ambrosi U163   Bestseller
BestsellerE-book
2014
      Cybersecurity : preventing terrorist attacks and protecting privacy in cyberspace : hearing before th KF26 .J87465 2009d   E-Gov Document 2010
4 additional entries    
Computer networks -- Security measures -- Handbooks, manuals, etc.    
      Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / Jason Andress, Steve Winte U163 .A64 2014eb   Bestseller
BestsellerE-book
2014
      Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi TK5105.59 .H3533 2012   Bestseller
BestsellerE-book
2012
      Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering b TK5105.59   Bestseller
BestsellerE-book
2012
      Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--fr TK5105.59   Bestseller
BestsellerE-book
2016
2 additional entries    
Computer networks -- Security measures -- History. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99005024 : Stewart, Andrew,     
      A vulnerable system the history of information security in the computer age / Andrew J. Stewart. QA76.9.A25 S755 2021   Bestseller
BestsellerE-book
2021
Computer networks -- Security measures -- International cooperation. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00006352 : Singapore.     
      Defense : cooperation : agreement between the United States of America and Singapore; signed at Singa   E-Gov Document 2011
Computer networks -- Security measures -- Korea (South) / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n79126802-781 : Korea (South)     
      Defense : cooperation : memorandum of understanding between the United States of America and the Repu   E-Gov Document 2012
Computer networks -- Security measures -- Law and legislation -- United States. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99004848 https://id.loc.gov/authorities/names/n78095330-781 : United States.     
      Review of the Department of Homeland Security's implementation of the Cybersecurity Act of 2015 / Off   E-Gov Document 2016
Computer networks -- Security measures -- Management.    
      Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from QA76.9.A25   Bestseller
BestsellerE-book
2019
      Learn Ansible : automate cloud, security, and network infrastructure using Ansible 2.x / Russ McKendr T58.5   Bestseller
BestsellerE-book
2018
Computer networks -- Security measures -- Poland. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n79131071-781 : Poland.     
      Defense : cooperation : Agreement between the United States of America and Poland, Signed at Warsaw,   E-Gov Document 2012
Computer networks -- Security measures -- Quality control. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00005852 : Mehan, Julie E.     
      CyberWar, CyberTerror, CyberCrime. HV6773 .M44 2008eb   Bestseller
BestsellerE-book
2008
Computer networks -- Security measures -- Research -- Government policy -- United States. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh2002006576 https://id.loc.gov/authorities/subjects/sh99005269 https://id.loc.gov/authorities/names/n78095330-781     
      Federal cybersecurity : strategy and implementation for research and development / Cory Medina, edito TK5105.59 .F43 2016   Bestseller
BestsellerE-book
2016
Computer networks -- Security measures -- Social aspects. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00002758 : National Academies of Sciences, Engineering, and Medicine (U.S.).     
      Decrypting the encryption debate : a framework for decision makers / Committee on Law Enforcement and QA76.9.A25 N37 2018   Bestseller
BestsellerE-book
2018
Computer networks -- Security measures -- Software.    
      Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade ant QA76.76.C68 Y44 2021   Bestseller
BestsellerE-book
2021
      Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : QA76.9.A25 G45 2007eb   Bestseller
BestsellerE-book
2007
      Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRTG / Eric Seagren ; Wes No TK5105.59 S43 2006eb   Bestseller
BestsellerE-book
2006
      Zabbix : enterprise network montioring made easy : learn how to gather detailed statistics and data w TK5105.5   Bestseller
BestsellerE-book
2017
Computer networks -- Security measures -- Standards.    
      CyberWar, CyberTerror, CyberCrime. HV6773 .M44 2008eb   Bestseller
BestsellerE-book
2008
      Implementing the ISO/IEC 27001 ISMS standard / Edward Humphreys. QA76.9.A25 H855 2016   Bestseller
BestsellerE-book
2016
Computer networks -- Security measures -- Study and teaching. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh2001008697     
      Research anthology on advancements in cybersecurity education / Information Resources Management Asso   Bestseller
BestsellerE-book
2022
Computer networks -- Security measures -- Testing.    
      BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing t QA76.9.A25 R36 2011eb   Bestseller
BestsellerE-book
2011
      BackTrack : Testing Wireless Network Security. TK5103.2   Bestseller
BestsellerE-book
2013
      Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hack QA76.9.A25   Bestseller
BestsellerE-book
2019
      Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration QA76.9.A25 S56 2012eb   Bestseller
BestsellerE-book
2012
2 additional entries    
Computer networks -- Security measures -- United States.    
      Additional controls can enhance the security of the automated commercial environment system.   E-Gov Document 2008
      Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex. UA23 .B586 2014   Bestseller
BestsellerE-book
2014
      Byte wars : the impact of September 11 on information technology / Ed Yourdon. QA76.9.A25 Y68 2002 ; Moore Stacks:Available   book
BookPrinted Material
2002
      Challenges remain in DHS' efforts to secure control systems.   E-Gov Document 2009
65 additional entries    
Computer networks -- Security measures -- United States -- 21st century. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh2002012478 : Ablon, Lillian,     
      Zero days, thousands of nights : the life and times of zero-day vulnerabilities and their exploits / QA76.76.C68 A25 2017eb online   Bestseller
BestsellerE-book
2017
Computer networks -- Security measures -- United States -- Congresses. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh99001533     
      Professionalizing the nation's cybersecurity workforce? : criteria for decision-making / Committee on QA76.9.C92 P764 2013 e-book   Bestseller
BestsellerE-book
2013
Computer networks -- Security measures -- United States -- Periodicals.    
      Issue review / the President's National Security Telecommunications Advisory Committee (NSTAC). TK5105.59 .I6 ; Moore Stacks:Available   book
BookPrinted Material
1997
      Issue review / the President's National Security Telecommunications Advisory Committee (NSTAC).   E-Gov Document 1997
Computer networks -- Security measures -- United States -- Planning.    
      The other quiet professionals : lessons for future cyber forces from the evolution of special forces U163 .P385 2014eb   Bestseller
BestsellerE-book
2014
      Redefining information warfare boundaries for an Army in a wireless world / Isaac R. Porche III, Chri UA23   Bestseller
BestsellerE-book
2013
Computer networks -- Security measures -- United States -- States. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh2001008678 : United States.     
      Cybersecurity State Coordinator Act of 2020 : report of the Committee on Homeland Security and Govern KF31 .H65 2020v   E-Gov Document 2020
computer networks simulation methods : Márquez Díaz, José,     
      Modelado y simulación de redes de computadores : aplicación de QoS con Opnet Modeler / José Márquez D QA76.9.C65 ebook   Bestseller
BestsellerE-book
2013
Computer Networks Small Business    
      Getting your business wired : using computer networking and the internet to grow your business / Will HD30.385 .K54 1999 ; Moore Stacks:Available   book
BookPrinted Material
1999
      Getting your business wired : using computer networking and the internet to grow your business / Will HD30.385 .K54 1999eb   Bestseller
BestsellerE-book
1999
      Impact of e-commerce on consumers and small firms / edited by Salvatore Zappal?a and Colin Gray. HF5548.32 .I46 2006eb   Bestseller
BestsellerE-book
2006
      Microsoft Office live small business : beginner's guide : build and customize your small business web HF5548.4.M537 2009eb   Bestseller
BestsellerE-book
2009
Computer Networks Small Business Security Measures    
      Federal government and small businesses : promoting greater information sharing for stronger cybersec KF27 .S6 2017u   E-Gov Document 2018
      Making Available Information Now to Strengthen Trust and Resilience and Enhance Enterprise Technology KF31 .C69 2017r   E-Gov Document 2017
Computer Networks Small Business Security Measures United States    
      Cyber crime : an existential threat to small business : hearing before the Committee on Small Busines KF26 .S6 2019d   E-Gov Document 2019
      Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T KF27 .S6442 2011b   E-Gov Document 2012
      Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T   book
BookPrinted Material
2012
      Foreign cyber threats : small business, big target : hearing before the Committee on Small Business, KF27 .S6 2016o   E-Gov Document 2017
7 additional entries    
Computer Networks Small Business Security Measures United States Costs    
      Foreign cyber threats : small business, big target : hearing before the Committee on Small Business, KF27 .S6 2016o   E-Gov Document 2017
      Small business information sharing : combating foreign cyber threats : hearing before the Committee o KF27 .S6 2017w   E-Gov Document 2018
Computer networks -- Social aspects.    
      An aesthesia of networks : conjunctive experience in art and technology / Anna Munster. QA76.9.C66 M857 2013eb   Bestseller
BestsellerE-book
2013
      Being digital / Nicholas Negroponte. TK5103.7 .N43 1995 ; Moore Stacks:Available   book
BookPrinted Material
1995
      Building virtual communities : learning and change in cyberspace / edited by K. Ann Renninger, Wesley TK5105.83 .B85 2002eb   Bestseller
BestsellerE-book
2002
      Community networks : lessons from Blacksburg, Virginia / Andrew Michael Cohill, Andrea L. Kavanaugh, TK5105.83 .C66 1999eb   Bestseller
BestsellerE-book
1999
26 additional entries    
Computer networks -- Social aspects -- Canada. / https://id.loc.gov/authorities/subjects/sh2008101318 https://id.loc.gov/authorities/names/n79007233-781     
      Connecting Canadians : investigations in community informatics / edited by Andrew Clement, Michael Gu HN110.Z9 I563 2011   Bestseller
BestsellerE-book
2012
Computer networks -- Social aspects -- Forecasting.    
      Divining a digital future : mess and mythology in ubiquitous computing / Paul Dourish and Genevieve B QA76.5915 .D68 2011eb   Bestseller
BestsellerE-book
2011
      Imagining the internet : personalities, predictions, perspectives / Janna Quitney Anderson. HM851 .A63 2005 ; Moore Stacks:Available   book
BookPrinted Material
2005
      Imagining the internet : personalities, predictions, perspectives / Janna Quitney Anderson. HM851 .A63 2005eb   Bestseller
BestsellerE-book
2005
Computer networks -- Social aspects -- India -- Almora. / https://id.loc.gov/authorities/subjects/sh2008101318 https://id.loc.gov/authorities/names/n89250403-781 : Arora, Payal.     
      Dot com mantra : social computing in the Central Himalayas / by Payal Arora. HN690.A455 A76 2010eb   Bestseller
BestsellerE-book
2010
Computer networks -- Software.    
      Cassandra high performance cookbook / Edward Capriolo. QA76.9.D3 C37 2011   Bestseller
BestsellerE-book
2011
      Learning VMware NSX - Second Edition. T55.4-60.8   Bestseller
BestsellerE-book
2017
      Linux Administration Cookbook : Insightful Recipes to Work with System Administration Tasks on Linux. QA76.76.O63 .D436 2018   Bestseller
BestsellerE-book
2018
      Linux networking cookbook / Gregory Boyce. TK5105.5   Bestseller
BestsellerE-book
2016
Computer networks -- Soviet Union -- History. / https://id.loc.gov/authorities/subjects/sh85029513 https://id.loc.gov/authorities/names/n80126312-781 https://id.loc.gov/authorities/subjects/sh99005024 : Peters, Benjamin,     
      How not to network a nation : the uneasy history of the Soviet internet / Benjamin Peters. TK5102.3.S68 P48 2016eb   Bestseller
BestsellerE-book
2016
Computer networks -- Standards.    
      High-performance data network design : design techniques and tools / Tony Kenyon. TK5105.5 .K45 2002eb   Bestseller
BestsellerE-book
2002
      OSI explained : end-to-end computer communication standards / John Henshall and Sandy Shaw. TK5105.5 .H47 1988 ; Moore Stacks:Available   book
BookPrinted Material
1988
Computer networks -- Standards -- Economic aspects. / https://id.loc.gov/authorities/subjects/sh91001977 https://id.loc.gov/authorities/subjects/sh99005484     
      Opening standards : the global politics of interoperability / Laura DeNardis, editor. TK5105.55 .O65 2011eb   Bestseller
BestsellerE-book
2011
Computer networks -- Standards -- Government policy. / https://id.loc.gov/authorities/subjects/sh91001977 https://id.loc.gov/authorities/subjects/sh99005269     
      Opening standards : the global politics of interoperability / Laura DeNardis, editor. TK5105.55 .O65 2011eb   Bestseller
BestsellerE-book
2011
Computer networks -- Standards -- Political aspects. / https://id.loc.gov/authorities/subjects/sh91001977 https://id.loc.gov/authorities/subjects/sh00005651     
      Opening standards : the global politics of interoperability / Laura DeNardis, editor. TK5105.55 .O65 2011eb   Bestseller
BestsellerE-book
2011
Computer networks -- Standards -- United States -- Evaluation. / https://id.loc.gov/authorities/subjects/sh91001978 https://id.loc.gov/authorities/subjects/sh00005674 : United States.     
      DHS must address Internet Protocol Version 6 challenges.   E-Gov Document 2008
Computer networks -- Statistics -- Congresses. / https://id.loc.gov/authorities/subjects/sh85029513 https://id.loc.gov/authorities/subjects/sh99001414 https://id.loc.gov/authorities/subjects/sh99001533     
      Proceedings of a Workshop on Statistics on Networks / Scott T. Weidman, editor ; Committee on Applied QA276.A1 P76 2007eb   Bestseller
BestsellerE-book
2007
Computer Networks Tax Administration And Procedure Security Measures United States : United States.     
      Improved controls are needed to ensure that all planned corrective actions for security weaknesses ar   E-Gov Document 2013
Computer Networks Teams In The Workplace    
      The virtual edge : embracing technology for distributed project team success / Margery Mayer. HD66.2 .M39 2010eb   Bestseller
BestsellerE-book
2010
      Working virtually : leading your organization and team, and advancing your personal career, in a mobi HD30.2122 .H644 2017   Bestseller
BestsellerE-book
2017
      Working virtually : managing people for successful virtual teams and organizations / Trina Hoefling. HD30.2122 .H63 2003eb   Bestseller
BestsellerE-book
2003
Computer networks -- Textbooks. / https://id.loc.gov/authorities/subjects/sh85029513 https://id.loc.gov/authorities/subjects/sh99001753 : Dixit, V. S.     
      Essentials of Computer Networks, Internet and Database Technologies. TK5105.5   Bestseller
BestsellerE-book
2012
Computer Networks Trans Union U S Security Measures    
      Consumer data security and the credit bureaus : hearing before the Committee on Banking, Housing, and KF26 .B39 2017t   E-Gov Document 2018
      Examining the Equifax data breach : hearing before the Committee on Financial Services, U.S. House of KF27 .F55 2017g   E-Gov Document 2018
Computer Networks Transportation Security Measures : D'Anna, Gloria D.,     
      Cybersecurity for commercial vehicles / edited and written by Gloria D. D'Anna ; with co-authors in o TL272.53 .D36 2019eb   Bestseller
BestsellerE-book
2019
Computer Networks Tribal Government Security Measures United States    
      State and Local Government Cybersecurity Act of 2019 : report of the Committee on Homeland Security a KF31 .H65 2019y   E-Gov Document 2019
      State and Local Government Cybersecurity Act of 2021 : report of the Committee on Homeland Security a KF31 .H65 2021m   E-Gov Document 2021
Resources
More Information
Result page:  Prev Next