My Library

   
Limit search to available items
135 results found. sorted by date .
Result Page   1 2 3 Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (1-50 of 135)
1
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954- author
Australia ; Boston, MA : Cengage Learning, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S55 2021    DUE 10-05-23 Billed
 Female Library  QA76.9.A25 S55 2021    Available
2
Book
Book Cover

Digital services in international trade law


Willemyns, Ines
Cambridge, United Kingdom ; New York, NY : Cambridge University Press, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  K3943.W55 2021    Available
3
Book
Book Cover

Digital government : managing public sector reform in the digital era


Lips, Miriam, 1967-
London ; New York, NY : Routledge, Taylor & Francis Group, 2020. 2020

Rating:

 

Copies

Location Call No. Status
 Male Library  JF1525.A8 L57 2020    Available
 Male Library  JF1525.A8 L57 2020 c.2  Available
 Female Library  JF1525.A8 L57 2020    Available
4
Book
Book Cover

Cyber risk management : prioritize threats, identify vulnerabilities and apply controls


Hodson, Christopher
London : KoganPage, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HD31.2.H637 2019    Available
 Male Library  HD31.2.H637 2019 c.2  Available
 Female Library  HD31.2.H637 2019    Available
5
Book
Book Cover

GDPR : how to achieve and maintain compliance


Foulsham, Mark, author
London ; New York : Routledge, Taylor & Francis Group, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HF5548.37.F68 2019    Available
 Male Library  HF5548.37.F68 2019 c.2  Available
 Female Library  HF5548.37.F68 2019    Available
There are additional copies/volumes of this item
6
Book
Book Cover

Python data analytics : with Pandas, NumPy, and Matplotlib


Nelli, Fabio
Berkeley, United States : Apress, c. 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.73.P98 N455 2018    Available
 Male Library  QA76.73.P98 N455 2018 c.2  Available
 Female Library  QA76.73.P98 N455 2018    Available
There are additional copies/volumes of this item
7
Book
Book Cover

Cybersecurity essentials


Brooks, Charles J., author
2018

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.B766 2018    Available
 Female Library  TK5105.59.B766 2018    Available
8
Text-Book
Book Cover

Digital systems design using VHDL


Roth, Charles H.
Mason, OH : Cengage Learning, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  TK7885.7.R67 2018    Available
 Female Library  TK7885.7.R67 2018    Available
 Male Library  TK7885.7.R67 2018 c.2  Available
There are additional copies/volumes of this item
9
Book
Book Cover

Copyright class struggle : creative economies in a social media age


Travis, Hannibal
Cambridge, United Kingdom ; New York : Cambridge University Press, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  K1420.5.T73 2018    Available
10
Book
Book Cover

Principles of information security


Whitman, Michael E., 1964-
Boston, MA : Cengage, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59 W54 2017    Available
 Female Library  TK5105.59 W54 2017    Available
11
Book
Book Cover

Expert Hadoop administration : managing, tuning, and securing Spark, YARN, and HDFS


Alapati, Sam R
Boston : Addison-Wesley, [2017] 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.D5 A437 2017    Available
 Male Library  QA76.9.D5 A437 2017    Available
12
Book
Book Cover

Sams teach yourself hadoop in 24 hours


Aven, Jeffrey
Indianapolis, IN : Sams, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.D5 A94 2017    Available
 Female Library  QA76.9.D5 A94 2017 c.2  Available
13
Book
Book Cover

Ethics for the information age


Quinn, Michael J. (Michael Jay)
Boston : Pearson, 2016 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.M65 Q56 2017    Available
 Female Library  QA76.9.M65 Q56 2017 c.2  Available
14
Book
Book Cover

Defensive security handbook : best practices for securing infrastructure


Brotherston, Lee
Sebastopol, CA : O'Reilly Media, Inc., 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B7747 2017    Available
 Male Library  QA76.9.A25 B7747 2017    Available
15
Book
Book Cover

CompTIA cybersecurity analyst (CSA+) cert guide


McMillan, Troy
Indianapolis, Indiana : Pearson, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M36 2017    Available
 Male Library  QA76.9.A25 M36 2017    Available
16
Text-Book
Book Cover

Cloud computing security : foundations and challenges



Boca Raton : CRC Press/Taylor & Francis Group, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.C5825 2017    Available
 Female Library  QA76.585.C5825 2017    Available
17
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S725 2017    Available
 Female Library  TK5105.59.S725 2017    Available
18
Text-Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William, author
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S713 2017 c.2  Available
 Male Library  TK5105.59.S713 2017    Available
 Female Library  TK5105.59.S713 2017    Available
There are additional copies/volumes of this item
19
Text-Book
Book Cover

Security in the private cloud



Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.S4435 2017    Available
 Female Library  QA76.585.S4435 2017    Available
20
Book
Book Cover

Principles of information security


Whitman, Michael E
Boston, MA : Cengage Learning, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2016    Available
21
Book
Book Cover

Information technology auditing


Hall, James A
Boston, MA : Cengage Learning, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A93 H34 2016    Available
 Male Library  QA76.9.A93 H34 2016    Available
22
Book
Book Cover

Machine learning models and algorithms for big data classification : thinking with examples for effective learning


Suthaharan, Shan
New York : Springer Science+Business Media, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.B45 S88 2016    Available
 Male Library  QA76.9.B45 S88 2016    Available
23
Book
Book Cover

CCNA wireless 200-355 official cert guide


Hucaby, Dave
Indianapolis, IN : Cisco Press, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.3 H83 2016    Available
 Male Library  QA76.3 H83 2016    Available
24
Book
Book Cover

Copies

Location Call No. Status
 Female Library  HD30.2 .V578 2017    Available
 Male Library  HD30.2 .V578 2017    Available
25
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S493 2016    Available
 Female Library  QA76.9.A25 S493 2016    Available
26
Book
Book Cover

Digital identity management : perspectives on the technological, business and social implications



London ; New York : Routledge, Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  HD30.38 .D545 2016    Available
 Female Library  HD30.38 .D545 2016    Available
27
Book
Book Cover

Elementary information security


Smith, Richard E., 1952-
Burlington, MA : Jones & Bartlett Learning, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S652 2016    Available
 Female Library  QA76.9.A25 S652 2016    Available
28
Book
Book Cover

CISSP guide to security essentials


Gregory, Peter H
Australia ; Boston, MA : Course Technology/Cengage Learning, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 G7497 2015    Available
29
Book
Book Cover

Security+ guide to network security fundamentals


Ciampa, Mark
Clifton Park, NY : Cengage Learning, 2015 2015

Rating:

Copies

Location Call No. Status
 Female Library  TK 5105.59 C52 2015    Available
30
Book
Book Cover

The hacker playbook 2 : practical guide to penetration testing


Kim, Peter
North Charleston, South Carolina : Secure Planet, LLC, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 K56 2015    Available
 Female Library  QA76.9.A25 K56 2015    Available
31
Book
Book Cover

Handbook of research on digital crime, cyberspace security, and information assurance



Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6773 .H375 2015    Available
 Male Library  HV6773 .H375 2015    Available
32
Text-Book
Book Cover

Case studies in secure computing : achievements and trends



Boca Raton : CRC Press/Taylor & Francis Group, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C426 2015    Available
 Female Library  QA76.9.A25 C426 2015    Available
33
Book
Book Cover

Java Methods : object-oriented programming and data structures


Litvin, Maria
Andover, United States : Skylight Pub., c. 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.73.J38 L588 2015    Available
 Male Library  QA76.73.J38 L588 2015 c.2  Available
 Female Library  QA76.73.J38 L588 2015    Available
There are additional copies/volumes of this item
34
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearsonl, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S725 2014    Available
 Female Library  TK5105.59 S725 2014 c.2  Available
35
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Stamford, CT, USA : Cengage Learning, 2014 2014

Rating:

Copies

36
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Australia ; Boston, MA, USA : Course Technology, Cengage Learning, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W415 2014    Available
37
Book
Book Cover

Copies

Location Call No. Status
 Female Library  QA76.9.E95 J84 2014    Available
 Female Library  QA76.9.E95 J84 2014 c.2  Available
38
Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress is an imprint of Elsevier, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C9183 2014    Available
 Male Library  QA76.9.A25 C9183 2014    Available
39
Book
Book Cover

Java concepts : early objects


Horstmann,Cay S
Hoboken, NJ : John Wiley & Sons, Inc., 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.73.J38 H6754 2014    Available
 Female Library  QA76.73.J38 H6754 2014 c.2  Available
40
Book
Book Cover

Network security through data analysis : building situational awareness


Collins, Michael (Michael Patrick)
Beijing : O'Reilly, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C64 2014    Available
 Female Library  TK5105.59 C64 2014 c.2  Available
41
Book
Book Cover

Computer security and penetration testing


Basta,Alfred
Stamford, Connecticut : Cengage Learning, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 B366 2014    Available
 Female Library  TK5105.59 B366 2014 c.2  Available
42
Book
Book Cover

Eleventh hour CISSP : study guide


Conrad, Eric, 1967-, author
Amsterdam : Elsevier, 2017. 2014

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.3.C65666 2017    Available
 Female Library  QA76.3.C65666 2017    Available
43
Book
Book Cover

Information security for managers


Workman, Michael D., 1957-
Burlington, MA : Jones & Bartlett Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5548.37 W67 2013    Available
 Female Library  HF5548.37 W67 2013 c.2  Available
 Female Library  HF5548.37 W67 2013 c.3  Available
There are additional copies/volumes of this item
44
Book
Book Cover

Information security : the complete reference


Rhodes-Ousley, Mark
Emeryville, Calif. : McGraw-Hill/Osborne ; London : McGraw-Hill [distributor], 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 R463 2013    Available
 Female Library  QA76.9.A25 R463 2013 c.2  Available
 Male Library  QA76.9.A25 R463 2013    Available
There are additional copies/volumes of this item
45
Book
Book Cover

Cisco CCENT/CCNA ICND1 100-101 official Cert guide


Odom, Wendell
Indianapolis, IN, : Cisco Press, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.5 O32 2013    DUE 11-14-19 11:59PM Billed
 Male Library  TK5105.5 O32 2013    Available
46
Book
Book Cover

Guide to network security



Boston, MA : Course Technology/Cengage Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
47
Book
Book Cover

Guide to network security


Whitman, Michael E
Boston, MA : Course Technology, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
48
Book
Book Cover

Cyber security culture : counteracting cyber threats through organizational learning and training


Trim, Peter R. J
London ; New York : Routledge, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HD30.2 .T75 2013    Available
 Male Library  HD30.2 .T75 2013    Available
49
Text-Book
Book Cover

Introduction to information systems


Marakas, George M
New York, NY : McGraw-Hill/Irwin, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5548.2 .O23 2013    Available
 Female Library  HF5548.2 .O23 2013 c.2  Available
 Male Library  HF5548.2 .O23 2013    Available
There are additional copies/volumes of this item
50
Book
Book Cover

Computer security : principles and practice


Stallings, William
Boston : Pearson, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2012    Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   1 2 3 Next