Skip to content
You are not logged in |Login  
     
Limit search to available items
Num Mark Subjects (1-32 of 32) Media Year
1   Computer networks Security measures -- 3 Related Subjects    
2 Computer networks -- Security measures.    
      Active Directory administration cookbook : actionable, proven solutions to identity management and au TK5105.595eb   Bestseller
BestsellerE-book
2019
      Advanced penetration testing for highly-secured environments / Lee Allen, Kevin Cardwell. QA76.9.A25   Bestseller
BestsellerE-book
2016
      Advanced penetration testing for highly-secured environments : the ultimate security guide / Lee Alle QA76.9.A25   Bestseller
BestsellerE-book
2012
      Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infr TK3105 .K63 2013   Bestseller
BestsellerE-book
2013
252 additional entries    
3 Computer networks -- Security measures -- Auditing. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99002413 : United States.     
      DHS can make improvements to secure industrial control systems.   E-Gov Document 2013
4 Computer networks -- Security measures -- Balkan Peninsula -- Congresses. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh85011191-781 https://id.loc.gov/authorities/subjects/sh99001533 : NATO Advanced Research Workshop on Managing Terrorism Threats to Critical Infrastructure - Challenges for South Eastern Europe     
      Comprehensive approach as "Sine Qua Non" for critical infrastructure protection / edited by Denis Čal HV6433.B28   Bestseller
BestsellerE-book
2014
5 Computer networks -- Security measures -- Computer programs.    
      Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting / Jim Noble [and others] QA76.9.A25 N63 2003eb   Bestseller
BestsellerE-book
2003
      Nmap 6 : network exploration and security auditing Cookbook / Paulino Calderón Pale. TK5105.59 .P35 2012   Bestseller
BestsellerE-book
2012
      Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and it TK5105.5485   Bestseller
BestsellerE-book
2017
      Wireshark network security : a succinct guide to securely administer your network using Wireshark / P TK5105.5956   Bestseller
BestsellerE-book
2015
6 Computer networks -- Security measures -- Congresses.    
      Aspects of network and information security / edited by Evangelos Kranakis, Evgueni Haroutunian, and TK5105.59 .A87 2008eb   Bestseller
BestsellerE-book
2008
      Best practices in computer network defense : incident detection and response / edited by Melissa E. H TK5105.59   Bestseller
BestsellerE-book
2014
      Beyond Spectre : confronting new technical and policy challenges ; proceedings of a workshop / Anne J TK5105.59   Bestseller
BestsellerE-book
2019
      Critical Infrastructure Protection / Edited by Matthew Edwards, Centre of Excellence--Defence against HV6431   Bestseller
BestsellerE-book
2014
16 additional entries    
7 Computer networks -- Security measures -- Evaluation.    
      Network security evaluation using the NSA IEM / Russ Rogers, technical editor and contributor ; Bryan TK5105.59 .N33 2005eb   Bestseller
BestsellerE-book
2005
      Network vulnerability assessment : identify security loopholes in your network's infrastructure / Sag TK5105.59   Bestseller
BestsellerE-book
2018
8 Computer networks -- Security measures -- Examinations. : Hargreaves, Brett,     
      IMPLEMENTING MICROSOFT AZURE ARCHITECT TECHNOLOGIES [electronic resource] : az-303 exam prep and beyo QA76.585   Bestseller
BestsellerE-book
2020
9 Computer networks -- Security measures -- Examinations, questions, etc. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99001543     
      Security+ study guide & DVD training system / [Michael Cross [and others]. TK5105.59 .S43 2007eb   Bestseller
BestsellerE-book
2007
10 Computer networks -- Security measures -- Examinations -- Study guides.    
      CCNA security 210-260 certification guide : build your knowledge of network security and pass your CC TK5105.59   Bestseller
BestsellerE-book
2018
      CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 t TK5105.59   Bestseller
BestsellerE-book
2020
      CISSP in 21 days / M.L. Srinivasan. QA76.3 .S75 2008eb   Bestseller
BestsellerE-book
2008
      CISSP in 21 days : boost your confidence and get the competitive edge you need to crack the exam in j QA76.3   Bestseller
BestsellerE-book
2016
5 additional entries    
11 Computer networks -- Security measures -- Fiction. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99001562 : Shein, Rob.     
      Zero day exploit : countdown to darkness / Rob Shein ; Marcus H. Sachs, technical editor. PS3619.H45 Z47 2004eb   Bestseller
BestsellerE-book
2004
12 Computer networks -- Security measures -- Germany. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n80125931-781 : Germany.     
      Defense : information exchange : memorandum of understanding between the United States of America and   E-Gov Document 2012
13 Computer networks -- Security measures -- Government policy.    
      At the nexus of cybersecurity and public policy : some basic concepts and issues / David Clark, Thoma QA76.9.A25 .A884 2014eb   Bestseller
BestsellerE-book
2014
      Cyber security and the politics of time / Tim Stevens. JZ1254 .S74 2015eb   Bestseller
BestsellerE-book
2015
      Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones. TK5105.59 .C364 2019eb   Bestseller
BestsellerE-book
2019
      Cybersecurity : public sector threats and responses / [edited by] Kim J. Andreasson. TK5105.59 .C927 2012 ; Moore Stacks:Available   book
BookPrinted Material
2012
14 Computer networks -- Security measures -- Government policy -- United States.    
      Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T KF27 .S6442 2011b   E-Gov Document 2012
      Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and T   book
BookPrinted Material
2012
      Cybersecurity : Executive Order 13636 and the critical infrastructure framework / Anastacia D'Ambrosi U163   Bestseller
BestsellerE-book
2014
      Cybersecurity : preventing terrorist attacks and protecting privacy in cyberspace : hearing before th KF26 .J87465 2009d   E-Gov Document 2010
4 additional entries    
15 Computer networks -- Security measures -- Handbooks, manuals, etc.    
      Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / Jason Andress, Steve Winte U163 .A64 2014eb   Bestseller
BestsellerE-book
2014
      Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi TK5105.59 .H3533 2012   Bestseller
BestsellerE-book
2012
      Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering b TK5105.59   Bestseller
BestsellerE-book
2012
      Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--fr TK5105.59   Bestseller
BestsellerE-book
2016
2 additional entries    
16 Computer networks -- Security measures -- History. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99005024 : Stewart, Andrew,     
      A vulnerable system the history of information security in the computer age / Andrew J. Stewart. QA76.9.A25 S755 2021   Bestseller
BestsellerE-book
2021
17 Computer networks -- Security measures -- International cooperation. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00006352 : Singapore.     
      Defense : cooperation : agreement between the United States of America and Singapore; signed at Singa   E-Gov Document 2011
18 Computer networks -- Security measures -- Korea (South) / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n79126802-781 : Korea (South)     
      Defense : cooperation : memorandum of understanding between the United States of America and the Repu   E-Gov Document 2012
19 Computer networks -- Security measures -- Law and legislation -- United States. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh99004848 https://id.loc.gov/authorities/names/n78095330-781 : United States.     
      Review of the Department of Homeland Security's implementation of the Cybersecurity Act of 2015 / Off   E-Gov Document 2016
20 Computer networks -- Security measures -- Management.    
      Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from QA76.9.A25   Bestseller
BestsellerE-book
2019
      Learn Ansible : automate cloud, security, and network infrastructure using Ansible 2.x / Russ McKendr T58.5   Bestseller
BestsellerE-book
2018
21 Computer networks -- Security measures -- Poland. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/names/n79131071-781 : Poland.     
      Defense : cooperation : Agreement between the United States of America and Poland, Signed at Warsaw,   E-Gov Document 2012
22 Computer networks -- Security measures -- Quality control. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00005852 : Mehan, Julie E.     
      CyberWar, CyberTerror, CyberCrime. HV6773 .M44 2008eb   Bestseller
BestsellerE-book
2008
23 Computer networks -- Security measures -- Research -- Government policy -- United States. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh2002006576 https://id.loc.gov/authorities/subjects/sh99005269 https://id.loc.gov/authorities/names/n78095330-781     
      Federal cybersecurity : strategy and implementation for research and development / Cory Medina, edito TK5105.59 .F43 2016   Bestseller
BestsellerE-book
2016
24 Computer networks -- Security measures -- Social aspects. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh00002758 : National Academies of Sciences, Engineering, and Medicine (U.S.).     
      Decrypting the encryption debate : a framework for decision makers / Committee on Law Enforcement and QA76.9.A25 N37 2018   Bestseller
BestsellerE-book
2018
25 Computer networks -- Security measures -- Software.    
      Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade ant QA76.76.C68 Y44 2021   Bestseller
BestsellerE-book
2021
      Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : QA76.9.A25 G45 2007eb   Bestseller
BestsellerE-book
2007
      Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRTG / Eric Seagren ; Wes No TK5105.59 S43 2006eb   Bestseller
BestsellerE-book
2006
      Zabbix : enterprise network montioring made easy : learn how to gather detailed statistics and data w TK5105.5   Bestseller
BestsellerE-book
2017
26 Computer networks -- Security measures -- Standards.    
      CyberWar, CyberTerror, CyberCrime. HV6773 .M44 2008eb   Bestseller
BestsellerE-book
2008
      Implementing the ISO/IEC 27001 ISMS standard / Edward Humphreys. QA76.9.A25 H855 2016   Bestseller
BestsellerE-book
2016
27 Computer networks -- Security measures -- Study and teaching. / https://id.loc.gov/authorities/subjects/sh94001277 https://id.loc.gov/authorities/subjects/sh2001008697     
      Research anthology on advancements in cybersecurity education / Information Resources Management Asso   Bestseller
BestsellerE-book
2022
28 Computer networks -- Security measures -- Testing.    
      BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing t QA76.9.A25 R36 2011eb   Bestseller
BestsellerE-book
2011
      BackTrack : Testing Wireless Network Security. TK5103.2   Bestseller
BestsellerE-book
2013
      Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hack QA76.9.A25   Bestseller
BestsellerE-book
2019
      Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration QA76.9.A25 S56 2012eb   Bestseller
BestsellerE-book
2012
2 additional entries    
29 Computer networks -- Security measures -- United States.    
      Additional controls can enhance the security of the automated commercial environment system.   E-Gov Document 2008
      Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex. UA23 .B586 2014   Bestseller
BestsellerE-book
2014
      Byte wars : the impact of September 11 on information technology / Ed Yourdon. QA76.9.A25 Y68 2002 ; Moore Stacks:Available   book
BookPrinted Material
2002
      Challenges remain in DHS' efforts to secure control systems.   E-Gov Document 2009
65 additional entries    
30 Computer networks -- Security measures -- United States -- 21st century. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh2002012478 : Ablon, Lillian,     
      Zero days, thousands of nights : the life and times of zero-day vulnerabilities and their exploits / QA76.76.C68 A25 2017eb online   Bestseller
BestsellerE-book
2017
31 Computer networks -- Security measures -- United States -- Congresses. / https://id.loc.gov/authorities/subjects/sh2008117725 https://id.loc.gov/authorities/subjects/sh99001533     
      Professionalizing the nation's cybersecurity workforce? : criteria for decision-making / Committee on QA76.9.C92 P764 2013 e-book   Bestseller
BestsellerE-book
2013
32 Computer networks -- Security measures -- United States -- Periodicals.    
      Issue review / the President's National Security Telecommunications Advisory Committee (NSTAC). TK5105.59 .I6 ; Moore Stacks:Available   book
BookPrinted Material
1997
      Issue review / the President's National Security Telecommunications Advisory Committee (NSTAC).   E-Gov Document 1997
Resources
More Information