Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Nearby Subjects are:
Result Page   Prev Next
Add Marked to Bag Add All On Page
Mark   Media Year
Computer Security Equipment Industry Corrupt Practices      
      "Free security scan" could cost time and money [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2008
Computer Security Equipment Industry Directories      
      Enterprise directory and security implementation guide : designing and implementing directories in yo Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2002
Computer Security Equipment Industry Vocational Guidance : More, Josh,     
      Breaking into information security : crafting a custom career path to get the job you really want / J Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2015
Computer Security European Union Countries : Kosta, Eleni.     
      Consent in European data protection law [electronic resource] / by Eleni Kosta. Axe ProQuest E-Book:Available   Electronic Book 2013
Computer Security Evaluation    
      BackTrack 4 [electronic resource] : assuring security by penetration testing : master the art of pene Axe ProQuest E-Book:Available   Electronic Book 2011
      Critical infrastructure protection [electronic resource] : significant challenges in developing analy Axe Federal Documents Online:Available   ElectronicResource GovDoc 2001
      Network security evaluation using the NSA IEM / Russ Rogers, technical editor and contributor ; Bryan Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2005
      The network security test lab : a step-by-step guide / Michael Gregg. Axe ProQuest E-Book:Available   Electronic Book 2015
      Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others]. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2004
Computer Security Evaluation Methodology    
      Network security assessment [electronic resource] : from vulnerability to patch / Steve Manzuik, Andr Axe ProQuest E-Book:Available   Electronic Book 2007
      Network security assessment : from vulnerability to patch / Steve Manzuik, André Gold, Chris Gatford. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2007
Computer Security Examinations : Sohaib, Mohd,     
      Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing includin Axe ProQuest E-Book:Available   Electronic Book 2022
Computer Security Examinations Practice : Wilhelm, Thomas.     
      Professional penetration testing : creating and operating a formal hacking lab / by Thomas Wilhelm. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2010
Computer Security Examinations Study Guides    
      CASP [electronic resource] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / Mich Axe ProQuest E-Book:Available   Electronic Book 2012
      CEH [electronic resource] : certified ethical hacker study guide / Kimberly Graves. Axe ProQuest E-Book:Available   Electronic Book 2010
      CISSP [electronic resource] : Certified Information Systems Security Professional study guide / James Axe ProQuest E-Book:Available   Electronic Book 2005
      CISSP [electronic resource] : Certified Information systems Security Professional ; study guide / Jam Axe ProQuest E-Book:Available   Electronic Book 2008
17 additional entries    
Computer Security Fiction    
      Cyber breaching : combat engineer operations in a cyber world / by Jonathan Bratten. Axe Federal Documents Online:Lib Use Only   Print Material 2016
      Digital fortress / Dan Brown. Pittsburg 2nd Fl Fiction:Available   Print Material 2004
      Stealing the network [electronic resource] : how to own a continent / Russ Rogers ... [et al.]; Ryan Axe ProQuest E-Book:Available   Electronic Book 2004
      Stealing the network [electronic resource] : how to own a shadow / Johnny Long, Timothy (Thor) Mulle Axe ProQuest E-Book:Available   Electronic Book 2007
8 additional entries    
Computer Security Forecasting : Howard, Doug.     
      Security 2020 [electronic resource] : reduce security risks this decade / Doug Howard and Kevin Princ Axe ProQuest E-Book:Available   Electronic Book 2011
Computer Security Government Policy    
      Cyber security policy guidebook [electronic resource] / Jennifer L. Bayuk ... [et al.]. Axe ProQuest E-Book:Available   Electronic Book 2012
      Rewired cybersecurity governance / edited by Ryan Ellis and Vivek Mohan. Axe ProQuest E-Book:Available   Electronic Book 2019
Computer Security Government Policy Caribbean Area : Saavedra Pérez, Boris Omar,     
      Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat Axe Federal Documents Online:Lib Use Only   Print Material 2017
Computer Security Government Policy Kansas      
      Department of Administration's SHaRP system : reviewing the upgrading of that system / conducted by A Axe Archives Kansas Documents:Available   Print Material 2004
Computer Security Government Policy Latin America : Saavedra Pérez, Boris Omar,     
      Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat Axe Federal Documents Online:Lib Use Only   Print Material 2017
Computer Security Government Policy United States    
      Assessing cybersecurity activities at NIST and DHS : hearing before the Subcommittee on Technology an Axe Federal Documents Online:Available   Electronic Book 2009
      Balancing privacy and innovation [electronic resource] : does the president's proposal tip the scale? Axe Federal Documents Online:Available   ElectronicResource GovDoc 2013
      Big data : privacy risks and needed reform in the public and private sectors : hearing before the Com Axe Federal Documents Online:Available   Electronic Book 2022
      The Comprehensive National Cybersecurity Initiative. Axe Federal Documents Online:Available   Electronic Book 2010
102 additional entries    
Computer Security Government Policy United States Evaluation    
      Additional department oversight can improve DHS' intelligence systems security program [electronic re Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
      DHS has made improvements on the security program for its intelligence systems [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
      Evaluation of DHS' information security program for fiscal year 2010 [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2010
      Homeland Security Information Network could support information sharing more effectively [electronic Axe Federal Documents Online:Available   ElectronicResource GovDoc 2006
10 additional entries    
Computer Security Government Policy United States Periodicals : National Science and Technology Council (U.S.).     
      Federal cybersecurity research and development strategic plan / prepared by the Cyber Security and In Axe Federal Documents Online:Available   Print Material 2019
Computer Security Handbooks Manuals Etc    
      The disaster recovery handbook [electronic resource] : a step-by-step plan to ensure business continu Axe ProQuest E-Book:Available   Electronic Book 2004
      Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of Axe Federal Documents Online:Available   ElectronicResource GovDoc 2007
      Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2012
      Handbook on securing cyber-physical critical infrastructure [electronic resource] / Sajal Das, Krishn Axe ProQuest E-Book:Available   Electronic Book 2012
9 additional entries    
Computer Security History      
      The history of information security : a comprehensive handbook / edited by Karl De Leeuw and Jan Berg Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2007
Computer Security Industrial Applications United States    
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) Axe Federal Documents Online:Available   Electronic Book 2008
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) Axe Federal Documents Online:Available   Electronic Book 2007
Computer Security Information Services      
      Roadmap to NIST information security documents [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2006
Computer Security International Cooperation    
      Cyberterrorism and computer crimes : issues surrounding the establishment of an international regime Axe Federal Documents Online:Available   ElectronicResource GovDoc 2000
      Information warfare arms control [electronic resource] : risks and costs / Maxie C. Thom. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2006
      Sharing the knowledge : government-private sector partnerships to enhance information security / Stev Axe Federal Documents Online:Available   ElectronicResource GovDoc 2000
      United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58 Axe Federal Documents Online:Available   Electronic Book 2016
Computer Security Juvenile Literature : Hudak, Heather C.,     
      Digital data security / Heather C. Hudak. Pittsburg 1st Fl Young Adult Non-Fiction:Available   Print Material 2019
Computer Security Kansas Auditing    
      State agency information systems : reviewing selected security controls in state agencies / [conducte Axe Archives Kansas Documents:Available   Print Material 2009
      State agency information systems : reviewing the Kansas Health Policy Authority's management of those Axe Archives Kansas Documents:Available   Print Material 2008
      Surplus computer equipment : determining whether state agencies effectively remove software and agenc Axe Archives Kansas Documents:Available   Print Material 2008
Computer Security Law And Legislation    
      Cybersecurity law, standards and regulations / Tari Schreider ; Kristen Noakes-Fry, editor. Axe ProQuest E-Book:Available   Electronic Book 2020
      I dati personali nel diritto Europeo / a cura di Vincenzo Cuffaro, Roberto D'Orazio, Vincenzo Ricciut Axe ProQuest E-Book:Available   Electronic Book 2019
      Lessons from the identity trail [electronic resource] : anonymity, privacy and identity in a networke Axe ProQuest E-Book:Available   Electronic Book 2009
      The manager's guide to cybersecurity law : essentials for today's business / Tari Schreider, Kristen Axe ProQuest E-Book:Available   Electronic Book 2017
      Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countries Axe ProQuest E-Book:Available   Electronic Book 2014
Computer Security Law And Legislation Australia : Sullivan, Clare.     
      Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi Axe JSTOR Open Ebooks:Available   Electronic Book 2011
Computer Security Law And Legislation Canada : Canada.     
      Scientific cooperation [electronic resource] : agreement between the United States of America and Can Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
Computer Security Law And Legislation Europe : Leisterer, Hannfried.     
      Internetsicherheit in Europa : Zur Gewährleistung der Netz- und Informationssicherheit durch Informat Axe JSTOR Open Ebooks:Available   Electronic Book 2018-
Computer Security Law And Legislation European Union Countries    
      Aviation Cybersecurity : Regulatory Approach in the European Union / Benjamyn I. Scott. Axe ProQuest E-Book:Available   Electronic Book 2019
      Sicherheit als Grundsatz : eine grundrechtsdogmatische Rekonstruktion im Unionsrecht am Beispiel der Axe JSTOR Open Ebooks:Available   Electronic Book 2017
Computer Security Law And Legislation Great Britain : Sullivan, Clare.     
      Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi Axe JSTOR Open Ebooks:Available   Electronic Book 2011
Computer Security Law And Legislation Israel : United States.     
      United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58 Axe Federal Documents Online:Available   Electronic Book 2016
Computer Security Law And Legislation Singapore : Singapore.     
      Defense [electronic resource] : cooperation : agreement between the United States of America and Sing Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
Computer Security Law And Legislation United States    
      9-8-8 Lifeline Cybersecurity Responsibility Act : report (to accompany H.R. 498). Axe Federal Documents Online:Available   Electronic Book 2023
      Better On-line Ticket Sales Act of 2016 : report (to accompany H.R. 5104) (including cost estimate of Axe Federal Documents Online:Available   Electronic Book 2016
      Better Online Ticket Sales Act of 2016 : report of the Committee on Commerce, Science, and Transporta Axe Federal Documents Online:Available   Electronic Book 2016
      A bill to extend the Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers Beyond Borders A Axe Archives Fed Docs:Lib Use Only   Print Material 2012
92 additional entries    
Computer Security Law And Legislation United States Evaluation : United States.     
      Information security [electronic resource] : emerging cybersecurity issues threaten federal informati Axe Federal Documents Online:Available   ElectronicResource GovDoc 2005
Computer Security Law And Legislation United States States    
      State and Local Cyber Protection Act of 2015 : report together with additional views (to accompany H. Axe Federal Documents Online:Available   Electronic Book 2015
      State and Local Cybersecurity Improvement Act : report (to accompany H.R. 5823) (including cost estim Axe Federal Documents Online:Available   Print Material 2020
Computer Security Management    
      Advanced penetration testing for highly-secured environments. Axe ProQuest E-Book:Available   Electronic Book 2016
      AVIEN malware defense guide for the Enterprise / David Harley [and others] ; foreword by Robert S. Vi Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2007
      The best damn IT security management book period / Bryan Cunningham [and others]. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2007
      The complete Metasploit guide : explore effective penetration testing techniques with Metasploit / Sa Axe ProQuest E-Book:Available   Electronic Book 2019
26 additional entries    
Computer Security Management Evaluation : United States.     
      Priority open recommendations: Securities and Exchange Commission. Axe Federal Documents Online:Available   Electronic Book 2023
Computer Security Management Examinations Study Guides      
      Official (ISC)² guide to the ISSMP CBK / edited by Harold F. Tipton. Axe ProQuest E-Book:Available   Electronic Book 2011
Computer Security Management Handbooks Manuals Etc    
      Information security management handbook / Vol. 2 Harold F. Tipton, Micki Krause, editors. Vol. 2. Axe 2nd Floor Stacks:Missing   Print Material 2004
      Information security management handbook. Volume 5 [electronic resource] / edited by Harold F. Tipton Axe ProQuest E-Book:Available   Electronic Book 2012
      Information security management handbook. Volume 6 [electronic resource] / edited by Harold F. Tipton Axe ProQuest E-Book:Available   Electronic Book 2012
      Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2006
      Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers Axe ProQuest E-Book:Available   Electronic Book 2006
Computer Security Management Standards    
      The case for ISO27001 : 2013 / Alan Calder. Axe ProQuest E-Book:Available   Electronic Book 2013
      Information security breaches : avoidance and treatment based on ISO27001 / Michael Krausz. Axe ProQuest E-Book:Available   Electronic Book 2009
Computer Security Mathematical Models : Brand, John H,     
      A proposed modeling protocol for evaluating information attacks / John H. Brand II. Axe Federal Documents Online:Available   Electronic Book 1999-
Computer Security Mathematics    
      Cybersecurity and applied mathematics / Leigh Metcalf, William Casey. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2016
      Security of block ciphers : from algorithm design to hardware implementation / Kazuo Sakiyama, Yu Sas Axe ProQuest E-Book:Available   Electronic Book 2015
Computer Security Moral And Ethical Aspects : Digital Enlightenment Forum,     
      Security for the digital world within an ethical framework / by the Digital Enlightenment Forum. Axe ProQuest E-Book:Available   Electronic Book 2016
Computer Security Moral And Ethical Aspects United States Case Studies : Johnston, Jessica R.,     
      Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jes Axe ProQuest E-Book:Available   Electronic Book 2009
Computer Security New Mexico Los Alamos : United States.     
      Continuing security concerns at Los Alamos National Laboratory [electronic resource] : hearings befor Axe Federal Documents Online:Available   ElectronicResource GovDoc 2007
Computer Security Periodicals    
      ACM transactions on information and system security. Axe Basement Bound Periodicals :Available, Axe Basement Current Periodicals :Available   Print Serial 1998
      Journal of cyber security & information systems. Axe Federal Documents Online:Available   Print Material 2012
Computer Security Psychological Aspects : Zinatullin, Leron,     
      The psychology of information security : resolving conflicts between security compliance and human be Axe ProQuest E-Book:Available   Electronic Book 2016
Computer Security Research    
      Cybersecurity in humanities and social sciences : a research methods approach / edited by Hugo Loisea Axe ProQuest E-Book:Available   Electronic Book 2020
      Perspectives on cybersecurity / Jakub Drmola. Axe ProQuest E-Book:Available   Electronic Book 2015
Computer Security Research United States    
      Cyber security R&D : hearing before the Subcommittee on Research and Science Education, Committee on Axe Federal Documents Online:Available   Electronic Book 2009
      Cybersecurity research and development : challenges and solutions : hearing before the Subcommittee o Axe Federal Documents Online:Available   Electronic Book 2013
      Information security [electronic resource] : coordination of federal cyber security research and deve Axe Federal Documents Online:Available   ElectronicResource GovDoc 2006
Add Marked to Bag Add All On Page
Result Page   Prev Next
 
    
Available items only