My Library

   
Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-47 of 47)
Computer networks -- Security measures
1
Book
Book Cover

Anti-hacker tool kit



New York : McGraw-Hill/Osborne, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 J65 2006    Available
2
Text-Book
Book Cover

Cloud computing security : foundations and challenges



Boca Raton : CRC Press/Taylor & Francis Group, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.C5825 2017    Available
 Female Library  QA76.585.C5825 2017    Available
3
Book
Book Cover

Computer security and penetration testing


Basta,Alfred
Stamford, Connecticut : Cengage Learning, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 B366 2014    Available
 Female Library  TK5105.59 B366 2014 c.2  Available
4
Book
Book Cover

Computer security fundamentals


Easttom, Chuck
Upper Saddle River, NJ : Pearson Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 E27 2006    Available
5
Book
Book Cover

Computer security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall, 2008 2008

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2008    Available
6
Book
Book Cover

Computer security : principles and practice


Stallings, William
Boston : Pearson, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2012    Available
7
Book
Book Cover

Corporate computer and network security


Panko, R. R
Boston : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P36 2010    Available
8
Book
Book Cover

cryptography and network security


Forouzan, Behrouz A
Boston : McGraw-Hill Higher Education, 2008 2008

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 F672 2008    Available
 Male Library  TK5105.59 F672 2008    Available
9
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006 2006

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2006    Available
 Female Library  TK5105.59 S713 2006 c.2  Available
 Male Library  TK5105.59 S713 2006    Available
10
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Boston : Prentice Hall, c2011 2011

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .S713 2011    Available
 Male Library  TK5105.59 .S713 2011    Available
11
Text-Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William, author
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S713 2017 c.2  Available
 Male Library  TK5105.59.S713 2017    Available
 Female Library  TK5105.59.S713 2017    Available
There are additional copies/volumes of this item
12
Book
Book Cover

Cyber risk management : prioritize threats, identify vulnerabilities and apply controls


Hodson, Christopher
London : KoganPage, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Male Library  HD31.2.H637 2019    Available
 Male Library  HD31.2.H637 2019 c.2  Available
 Female Library  HD31.2.H637 2019    Available
13
Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress is an imprint of Elsevier, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C9183 2014    Available
 Male Library  QA76.9.A25 C9183 2014    Available
14
Book
Book Cover

Cyber security culture : counteracting cyber threats through organizational learning and training


Trim, Peter R. J
London ; New York : Routledge, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HD30.2 .T75 2013    Available
 Male Library  HD30.2 .T75 2013    Available
15
Book
Book Cover

Cybersecurity essentials


Brooks, Charles J., author
2018

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.B766 2018    Available
 Female Library  TK5105.59.B766 2018    Available
16
Book
Book Cover

Data communications and network security


Carr, Houston H., 1937-
Boston : McGraw-Hill Irwin, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C365 2007    Available
17
Book
Book Cover

Digital identity management : perspectives on the technological, business and social implications



London ; New York : Routledge, Taylor & Francis Group, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  HD30.38 .D545 2016    Available
 Female Library  HD30.38 .D545 2016    Available
18
Book
Book Cover

Elementary information security


Smith, Richard E., 1952-
Burlington, MA : Jones & Bartlett Learning, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S652 2016    Available
 Female Library  QA76.9.A25 S652 2016    Available
19
Book
Book Cover

End-to-end network security : defense-in-depth


Santos, Omar
Indianapolis, Ind. : Cisco Press, 2008 2008

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 S313 2008    Available
20
Book
Book Cover

Fundamentals of network security


Maiwald, Eric
New York : McGraw-Hill Technology Education, 2004 2004

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 M362 2004    Available
21
Book
Book Cover

Guide to firewalls and network security : intrusion detection and VPNs.



Clifton Park, N.Y. : Course Technology/Cengage Learning, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 G85 2009    Available
22
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Australia ; Boston, MA, USA : Course Technology, Cengage Learning, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W415 2014    Available
23
Book
Book Cover

Guide to network security



Boston, MA : Course Technology/Cengage Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
24
Book
Book Cover

Guide to network security


Whitman, Michael E
Boston, MA : Course Technology, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
25
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S493 2016    Available
 Female Library  QA76.9.A25 S493 2016    Available
26
Book
Book Cover

The hacker playbook 2 : practical guide to penetration testing


Kim, Peter
North Charleston, South Carolina : Secure Planet, LLC, 2015 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 K56 2015    Available
 Female Library  QA76.9.A25 K56 2015    Available
27
Book
Book Cover

Handbook of research on digital crime, cyberspace security, and information assurance



Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6773 .H375 2015    Available
 Male Library  HV6773 .H375 2015    Available
28
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954- author
Australia ; Boston, MA : Cengage Learning, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S55 2021    DUE 10-05-23 Billed
 Female Library  QA76.9.A25 S55 2021    Available
29
Book
Book Cover

Information security for managers


Workman, Michael D., 1957-
Burlington, MA : Jones & Bartlett Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HF5548.37 W67 2013    Available
 Female Library  HF5548.37 W67 2013 c.2  Available
 Female Library  HF5548.37 W67 2013 c.3  Available
There are additional copies/volumes of this item
30
Book
Book Cover

Information security : the complete reference


Rhodes-Ousley, Mark
Emeryville, Calif. : McGraw-Hill/Osborne ; London : McGraw-Hill [distributor], 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 R463 2013    Available
 Female Library  QA76.9.A25 R463 2013 c.2  Available
 Male Library  QA76.9.A25 R463 2013    Available
There are additional copies/volumes of this item
31
Text-Book
Book Cover

IT auditing : using controls to protect information assets


Kegerreis, Mike
New York : McGraw-Hill, c2020. 2011

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A93 K44 2020    Available
 Male Library  QA76.9.A93 K44 2020 c.2  Available
 Female Library  QA76.9.A93 K44 2020    Available
There are additional copies/volumes of this item
32
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Boston, Mass. ; London : Course Technology, 2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2004    Available
33
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Stamford, CT, USA : Cengage Learning, 2014 2014

Rating:

Copies

34
Book
Book Cover

The management of network security : technology, design, and management control


Carr, Houston H., 1937-
Upper Saddle River, N.J. : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C3655 2010    Available
 Female Library  TK5105.59 C3655 2010 c.2  Available
35
Book
Book Cover

Network defense and countermeasures : principles and practices


Easttom, Chuck
Upper Saddle River, N.J. : Pearson Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 E26 2006    Available
36
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearsonl, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S725 2014    Available
 Female Library  TK5105.59 S725 2014 c.2  Available
37
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S725 2017    Available
 Female Library  TK5105.59.S725 2017    Available
38
Book
Book Cover

Network security first-step


Thomas, Thomas M
Indianapolis, IN : Cisco Press, c2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59.T43 2004    Available
39
Book
Book Cover

Network security fundamentals


Laet, Gert De
Indianapolis, Ind. : Cisco, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 L34 2005    Available
40
Book
Book Cover

Network security : the complete reference


Bragg, Roberta
New York : McGraw-Hill/Osborne, 2004 2004

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 B725 2004    Available
 Female Library  TK5105.59 B725 2004 c.2  Available
41
Book
Book Cover

Network security through data analysis : building situational awareness


Collins, Michael (Michael Patrick)
Beijing : O'Reilly, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C64 2014    Available
 Female Library  TK5105.59 C64 2014 c.2  Available
42
Book
Book Cover

Principles of information security


Whitman, Michael E. 1964-
Boston, Mass. : Course Technology Cengage Learning , 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2009    Available
43
Book
Book Cover

Principles of information security


Whitman, Michael E
Boston, MA : Cengage Learning, 2016 2016

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2016    Available
44
Book
Book Cover

Principles of information security


Whitman, Michael E., 1964-
Boston, MA : Cengage, 2017 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59 W54 2017    Available
 Female Library  TK5105.59 W54 2017    Available
45
Book
Book Cover

Router security strategies : securing IP network traffic planes


Schudel, Gregg
Indianapolis, Ind. : Cisco Press, 2008 2008

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.543 S38 2008    Available
46
Text-Book
Book Cover

Security in the private cloud



Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.S4435 2017    Available
 Female Library  QA76.585.S4435 2017    Available
47
Book
Book Cover

Web security : for network and system administrators


Mackey, David
Cambridge, Mass. ; London : Course Technology, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M27 2003    Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information