1
Computer networks Security measures
--
3 Related Subjects
2
Computer networks -- Security measures.
Active Directory administration cookbook : actionable, proven solutions to identity management and au
TK5105.595eb
Bestseller
2019
Advanced penetration testing for highly-secured environments / Lee Allen, Kevin Cardwell.
QA76.9.A25
Bestseller
2016
Advanced penetration testing for highly-secured environments : the ultimate security guide / Lee Alle
QA76.9.A25
Bestseller
2012
Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infr
TK3105 .K63 2013
Bestseller
2013
252 additional entries
3
Computer networks -- Security measures -- Auditing. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99002413 : United States.
DHS can make improvements to secure industrial control systems.
E-Gov Document
2013
4
Computer networks -- Security measures -- Balkan Peninsula -- Congresses. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh85011191-781 https://id.loc.gov/authorities/subjects/sh99001533 : NATO Advanced Research Workshop on Managing Terrorism Threats to Critical Infrastructure - Challenges for South Eastern Europe
Comprehensive approach as "Sine Qua Non" for critical infrastructure protection / edited by Denis Čal
HV6433.B28
Bestseller
2014
5
Computer networks -- Security measures -- Computer programs.
Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting / Jim Noble [and others]
QA76.9.A25 N63 2003eb
Bestseller
2003
Nmap 6 : network exploration and security auditing Cookbook / Paulino Calderón Pale.
TK5105.59 .P35 2012
Bestseller
2012
Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and it
TK5105.5485
Bestseller
2017
Wireshark network security : a succinct guide to securely administer your network using Wireshark / P
TK5105.5956
Bestseller
2015
6
Computer networks -- Security measures -- Congresses.
Aspects of network and information security / edited by Evangelos Kranakis, Evgueni Haroutunian, and
TK5105.59 .A87 2008eb
Bestseller
2008
Best practices in computer network defense : incident detection and response / edited by Melissa E. H
TK5105.59
Bestseller
2014
Beyond Spectre : confronting new technical and policy challenges ; proceedings of a workshop / Anne J
TK5105.59
Bestseller
2019
Critical Infrastructure Protection / Edited by Matthew Edwards, Centre of Excellence--Defence against
HV6431
Bestseller
2014
16 additional entries
7
Computer networks -- Security measures -- Evaluation.
Network security evaluation using the NSA IEM / Russ Rogers, technical editor and contributor ; Bryan
TK5105.59 .N33 2005eb
Bestseller
2005
Network vulnerability assessment : identify security loopholes in your network's infrastructure / Sag
TK5105.59
Bestseller
2018
8
Computer networks -- Security measures -- Examinations. : Hargreaves, Brett,
IMPLEMENTING MICROSOFT AZURE ARCHITECT TECHNOLOGIES [electronic resource] : az-303 exam prep and beyo
QA76.585
Bestseller
2020
9
Computer networks -- Security measures -- Examinations, questions, etc. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99001543
Security+ study guide & DVD training system / [Michael Cross [and others].
TK5105.59 .S43 2007eb
Bestseller
2007
10
Computer networks -- Security measures -- Examinations -- Study guides.
CCNA security 210-260 certification guide : build your knowledge of network security and pass your CC
TK5105.59
Bestseller
2018
CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 t
TK5105.59
Bestseller
2020
CISSP in 21 days / M.L. Srinivasan.
QA76.3 .S75 2008eb
Bestseller
2008
CISSP in 21 days : boost your confidence and get the competitive edge you need to crack the exam in j
QA76.3
Bestseller
2016
5 additional entries
11
Computer networks -- Security measures -- Fiction. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99001562 : Shein, Rob.
Zero day exploit : countdown to darkness / Rob Shein ; Marcus H. Sachs, technical editor.
PS3619.H45 Z47 2004eb
Bestseller
2004
12
Computer networks -- Security measures -- Germany. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n80125931-781 : Germany.
Defense : information exchange : memorandum of understanding between the United States of America and
E-Gov Document
2012
13
Computer networks -- Security measures -- Government policy.
At the nexus of cybersecurity and public policy : some basic concepts and issues / David Clark, Thoma
QA76.9.A25 .A884 2014eb
Bestseller
2014
Cyber security and the politics of time / Tim Stevens.
JZ1254 .S74 2015eb
Bestseller
2015
Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones.
TK5105.59 .C364 2019eb
Bestseller
2019
Cybersecurity : public sector threats and responses / [edited by] Kim J. Andreasson.
TK5105.59 .C927 2012
;
Moore Stacks:Available
Book
2012
14
Computer networks -- Security measures -- Government policy -- United States.
Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T
KF27 .S6442 2011b
E-Gov Document
2012
Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T
Book
2012
Cybersecurity : Executive Order 13636 and the critical infrastructure framework / Anastacia D'Ambrosi
U163
Bestseller
2014
Cybersecurity : preventing terrorist attacks and protecting privacy in cyberspace : hearing before th
KF26 .J87465 2009d
E-Gov Document
2010
4 additional entries
15
Computer networks -- Security measures -- Handbooks, manuals, etc.
Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / Jason Andress, Steve Winte
U163 .A64 2014eb
Bestseller
2014
Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi
TK5105.59 .H3533 2012
Bestseller
2012
Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering b
TK5105.59
Bestseller
2012
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--fr
TK5105.59
Bestseller
2016
2 additional entries
16
Computer networks -- Security measures -- History. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99005024 : Stewart, Andrew,
A vulnerable system the history of information security in the computer age / Andrew J. Stewart.
QA76.9.A25 S755 2021
Bestseller
2021
17
Computer networks -- Security measures -- International cooperation. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00006352 : Singapore.
Defense : cooperation : agreement between the United States of America and Singapore; signed at Singa
E-Gov Document
2011
18
Computer networks -- Security measures -- Korea (South) / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n79126802-781 : Korea (South)
Defense : cooperation : memorandum of understanding between the United States of America and the Repu
E-Gov Document
2012
19
Computer networks -- Security measures -- Law and legislation -- United States. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99004848 https://id.loc.gov/authorities/names/n78095330-781 : United States.
Review of the Department of Homeland Security's implementation of the Cybersecurity Act of 2015 / Off
E-Gov Document
2016
20
Computer networks -- Security measures -- Management.
Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from
QA76.9.A25
Bestseller
2019
Learn Ansible : automate cloud, security, and network infrastructure using Ansible 2.x / Russ McKendr
T58.5
Bestseller
2018
21
Computer networks -- Security measures -- Poland. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n79131071-781 : Poland.
Defense : cooperation : Agreement between the United States of America and Poland, Signed at Warsaw,
E-Gov Document
2012
22
Computer networks -- Security measures -- Quality control. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00005852 : Mehan, Julie E.
CyberWar, CyberTerror, CyberCrime.
HV6773 .M44 2008eb
Bestseller
2008
23
Computer networks -- Security measures -- Research -- Government policy -- United States. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh2002006576 https://id.loc.gov/authorities/subjects/sh99005269 https://id.loc.gov/authorities/names/n78095330-781
Federal cybersecurity : strategy and implementation for research and development / Cory Medina, edito
TK5105.59 .F43 2016
Bestseller
2016
24
Computer networks -- Security measures -- Social aspects. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00002758 : National Academies of Sciences, Engineering, and Medicine (U.S.).
Decrypting the encryption debate : a framework for decision makers / Committee on Law Enforcement and
QA76.9.A25 N37 2018
Bestseller
2018
25
Computer networks -- Security measures -- Software.
Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade ant
QA76.76.C68 Y44 2021
Bestseller
2021
Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers :
QA76.9.A25 G45 2007eb
Bestseller
2007
Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRTG / Eric Seagren ; Wes No
TK5105.59 S43 2006eb
Bestseller
2006
Zabbix : enterprise network montioring made easy : learn how to gather detailed statistics and data w
TK5105.5
Bestseller
2017
26
Computer networks -- Security measures -- Standards.
CyberWar, CyberTerror, CyberCrime.
HV6773 .M44 2008eb
Bestseller
2008
Implementing the ISO/IEC 27001 ISMS standard / Edward Humphreys.
QA76.9.A25 H855 2016
Bestseller
2016
27
Computer networks -- Security measures -- Study and teaching. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh2001008697
Research anthology on advancements in cybersecurity education / Information Resources Management Asso
Bestseller
2022
28
Computer networks -- Security measures -- Testing.
BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing t
QA76.9.A25 R36 2011eb
Bestseller
2011
BackTrack : Testing Wireless Network Security.
TK5103.2
Bestseller
2013
Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hack
QA76.9.A25
Bestseller
2019
Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration
QA76.9.A25 S56 2012eb
Bestseller
2012
2 additional entries
29
Computer networks -- Security measures -- United States.
Additional controls can enhance the security of the automated commercial environment system.
E-Gov Document
2008
Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex.
UA23 .B586 2014
Bestseller
2014
Byte wars : the impact of September 11 on information technology / Ed Yourdon.
QA76.9.A25 Y68 2002
;
Moore Stacks:Available
Book
2002
Challenges remain in DHS' efforts to secure control systems.
E-Gov Document
2009
65 additional entries
30
Computer networks -- Security measures -- United States -- 21st century. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh2002012478 : Ablon, Lillian,
Zero days, thousands of nights : the life and times of zero-day vulnerabilities and their exploits /
QA76.76.C68 A25 2017eb online
Bestseller
2017
31
Computer networks -- Security measures -- United States -- Congresses. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh99001533
Professionalizing the nation's cybersecurity workforce? : criteria for decision-making / Committee on
QA76.9.C92 P764 2013 e-book
Bestseller
2013
32
Computer networks -- Security measures -- United States -- Periodicals.
Issue review / the President's National Security Telecommunications Advisory Committee (NSTAC).
TK5105.59 .I6
;
Moore Stacks:Available
Book
1997
Issue review / the President's National Security Telecommunications Advisory Committee (NSTAC).
E-Gov Document
1997
Save Marked Records
Save to List