|
|
Computer Security Evaluation
|
|
|
BackTrack 4 [electronic resource] : assuring security by penetration testing : master the art of pene
Axe ProQuest E-Book:Available
|
|
2011
|
Critical infrastructure protection [electronic resource] : significant challenges in developing analy
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Network security evaluation using the NSA IEM / Russ Rogers, technical editor and contributor ; Bryan
Axe Elsevier ScienceDirect Ebook:Available
|
|
2005
|
The network security test lab : a step-by-step guide / Michael Gregg.
Axe ProQuest E-Book:Available
|
|
2015
|
Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others].
Axe Elsevier ScienceDirect Ebook:Available
|
|
2004
|
|
Computer Security Evaluation Methodology
|
|
|
Network security assessment [electronic resource] : from vulnerability to patch / Steve Manzuik, Andr
Axe ProQuest E-Book:Available
|
|
2007
|
Network security assessment : from vulnerability to patch / Steve Manzuik, André Gold, Chris Gatford.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
|
Computer Security Examinations : Sohaib, Mohd,
|
|
|
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing includin
Axe ProQuest E-Book:Available
|
|
2022
|
|
Computer Security Examinations Practice : Wilhelm, Thomas.
|
|
|
Professional penetration testing : creating and operating a formal hacking lab / by Thomas Wilhelm.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2010
|
|
Computer Security Examinations Study Guides
|
|
|
CASP [electronic resource] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / Mich
Axe ProQuest E-Book:Available
|
|
2012
|
CEH [electronic resource] : certified ethical hacker study guide / Kimberly Graves.
Axe ProQuest E-Book:Available
|
|
2010
|
CISSP [electronic resource] : Certified Information Systems Security Professional study guide / James
Axe ProQuest E-Book:Available
|
|
2005
|
CISSP [electronic resource] : Certified Information systems Security Professional ; study guide / Jam
Axe ProQuest E-Book:Available
|
|
2008
|
17 additional entries
|
|
|
|
Computer Security Fiction
|
|
|
Cyber breaching : combat engineer operations in a cyber world / by Jonathan Bratten.
Axe Federal Documents Online:Lib Use Only
|
|
2016
|
Digital fortress / Dan Brown.
Pittsburg 2nd Fl Fiction:Available
|
|
2004
|
Stealing the network [electronic resource] : how to own a continent / Russ Rogers ... [et al.]; Ryan
Axe ProQuest E-Book:Available
|
|
2004
|
Stealing the network [electronic resource] : how to own a shadow / Johnny Long, Timothy (Thor) Mulle
Axe ProQuest E-Book:Available
|
|
2007
|
8 additional entries
|
|
|
|
Computer Security Forecasting : Howard, Doug.
|
|
|
Security 2020 [electronic resource] : reduce security risks this decade / Doug Howard and Kevin Princ
Axe ProQuest E-Book:Available
|
|
2011
|
|
Computer Security Government Policy
|
|
|
Cyber security policy guidebook [electronic resource] / Jennifer L. Bayuk ... [et al.].
Axe ProQuest E-Book:Available
|
|
2012
|
Rewired cybersecurity governance / edited by Ryan Ellis and Vivek Mohan.
Axe ProQuest E-Book:Available
|
|
2019
|
|
Computer Security Government Policy Caribbean Area : Saavedra Pérez, Boris Omar,
|
|
|
Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat
Axe Federal Documents Online:Lib Use Only
|
|
2017
|
|
Computer Security Government Policy Kansas
|
|
|
Department of Administration's SHaRP system : reviewing the upgrading of that system / conducted by A
Axe Archives Kansas Documents:Available
|
|
2004
|
|
Computer Security Government Policy Latin America : Saavedra Pérez, Boris Omar,
|
|
|
Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat
Axe Federal Documents Online:Lib Use Only
|
|
2017
|
|
Computer Security Government Policy United States
|
|
|
Assessing cybersecurity activities at NIST and DHS : hearing before the Subcommittee on Technology an
Axe Federal Documents Online:Available
|
|
2009
|
Balancing privacy and innovation [electronic resource] : does the president's proposal tip the scale?
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2013
|
Big data : privacy risks and needed reform in the public and private sectors : hearing before the Com
Axe Federal Documents Online:Available
|
|
2022
|
The Comprehensive National Cybersecurity Initiative.
Axe Federal Documents Online:Available
|
|
2010
|
101 additional entries
|
|
|
|
Computer Security Government Policy United States Evaluation
|
|
|
Additional department oversight can improve DHS' intelligence systems security program [electronic re
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
DHS has made improvements on the security program for its intelligence systems [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Evaluation of DHS' information security program for fiscal year 2010 [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
Homeland Security Information Network could support information sharing more effectively [electronic
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
10 additional entries
|
|
|
|
Computer Security Government Policy United States Periodicals : National Science and Technology Council (U.S.).
|
|
|
Federal cybersecurity research and development strategic plan / prepared by the Cyber Security and In
Axe Federal Documents Online:Available
|
|
2019
|
|
Computer Security Handbooks Manuals Etc
|
|
|
The disaster recovery handbook [electronic resource] : a step-by-step plan to ensure business continu
Axe ProQuest E-Book:Available
|
|
2004
|
Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi
Axe Elsevier ScienceDirect Ebook:Available
|
|
2012
|
Handbook on securing cyber-physical critical infrastructure [electronic resource] / Sajal Das, Krishn
Axe ProQuest E-Book:Available
|
|
2012
|
9 additional entries
|
|
|
|
Computer Security History
|
|
|
The history of information security : a comprehensive handbook / edited by Karl De Leeuw and Jan Berg
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
|
Computer Security Industrial Applications United States
|
|
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2008
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2007
|
|
Computer Security Information Services
|
|
|
Roadmap to NIST information security documents [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
Computer Security International Cooperation
|
|
|
Cyberterrorism and computer crimes : issues surrounding the establishment of an international regime
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
Information warfare arms control [electronic resource] : risks and costs / Maxie C. Thom.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Sharing the knowledge : government-private sector partnerships to enhance information security / Stev
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58
Axe Federal Documents Online:Available
|
|
2016
|
|
Computer Security Juvenile Literature : Hudak, Heather C.,
|
|
|
Digital data security / Heather C. Hudak.
Pittsburg 1st Fl Young Adult Non-Fiction:Available
|
|
2019
|
|
Computer Security Kansas Auditing
|
|
|
State agency information systems : reviewing selected security controls in state agencies / [conducte
Axe Archives Kansas Documents:Available
|
|
2009
|
State agency information systems : reviewing the Kansas Health Policy Authority's management of those
Axe Archives Kansas Documents:Available
|
|
2008
|
Surplus computer equipment : determining whether state agencies effectively remove software and agenc
Axe Archives Kansas Documents:Available
|
|
2008
|
|
Computer Security Law And Legislation
|
|
|
Cybersecurity law, standards and regulations / Tari Schreider ; Kristen Noakes-Fry, editor.
Axe ProQuest E-Book:Available
|
|
2020
|
I dati personali nel diritto Europeo / a cura di Vincenzo Cuffaro, Roberto D'Orazio, Vincenzo Ricciut
Axe ProQuest E-Book:Available
|
|
2019
|
Lessons from the identity trail [electronic resource] : anonymity, privacy and identity in a networke
Axe ProQuest E-Book:Available
|
|
2009
|
The manager's guide to cybersecurity law : essentials for today's business / Tari Schreider, Kristen
Axe ProQuest E-Book:Available
|
|
2017
|
Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countries
Axe ProQuest E-Book:Available
|
|
2014
|
|
Computer Security Law And Legislation Australia : Sullivan, Clare.
|
|
|
Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi
Axe JSTOR Open Ebooks:Available
|
|
2011
|
|
Computer Security Law And Legislation Canada : Canada.
|
|
|
Scientific cooperation [electronic resource] : agreement between the United States of America and Can
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
|
Computer Security Law And Legislation Europe : Leisterer, Hannfried.
|
|
|
Internetsicherheit in Europa : Zur Gewährleistung der Netz- und Informationssicherheit durch Informat
Axe JSTOR Open Ebooks:Available
|
|
2018-
|
|
Computer Security Law And Legislation European Union Countries
|
|
|
Aviation Cybersecurity : Regulatory Approach in the European Union / Benjamyn I. Scott.
Axe ProQuest E-Book:Available
|
|
2019
|
Sicherheit als Grundsatz : eine grundrechtsdogmatische Rekonstruktion im Unionsrecht am Beispiel der
Axe JSTOR Open Ebooks:Available
|
|
2017
|
|
Computer Security Law And Legislation Great Britain : Sullivan, Clare.
|
|
|
Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi
Axe JSTOR Open Ebooks:Available
|
|
2011
|
|
Computer Security Law And Legislation Israel : United States.
|
|
|
United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58
Axe Federal Documents Online:Available
|
|
2016
|
|
Computer Security Law And Legislation Singapore : Singapore.
|
|
|
Defense [electronic resource] : cooperation : agreement between the United States of America and Sing
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
|
Computer Security Law And Legislation United States
|
|
|
9-8-8 Lifeline Cybersecurity Responsibility Act : report (to accompany H.R. 498).
Axe Federal Documents Online:Available
|
|
2023
|
Better On-line Ticket Sales Act of 2016 : report (to accompany H.R. 5104) (including cost estimate of
Axe Federal Documents Online:Available
|
|
2016
|
Better Online Ticket Sales Act of 2016 : report of the Committee on Commerce, Science, and Transporta
Axe Federal Documents Online:Available
|
|
2016
|
A bill to extend the Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers Beyond Borders A
Axe Archives Fed Docs:Lib Use Only
|
|
2012
|
92 additional entries
|
|
|
|
Computer Security Law And Legislation United States Evaluation : United States.
|
|
|
Information security [electronic resource] : emerging cybersecurity issues threaten federal informati
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
|
Computer Security Law And Legislation United States States
|
|
|
State and Local Cyber Protection Act of 2015 : report together with additional views (to accompany H.
Axe Federal Documents Online:Available
|
|
2015
|
State and Local Cybersecurity Improvement Act : report (to accompany H.R. 5823) (including cost estim
Axe Federal Documents Online:Available
|
|
2020
|
|
Computer Security Management
|
|
|
Advanced penetration testing for highly-secured environments.
Axe ProQuest E-Book:Available
|
|
2016
|
AVIEN malware defense guide for the Enterprise / David Harley [and others] ; foreword by Robert S. Vi
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
The best damn IT security management book period / Bryan Cunningham [and others].
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
The complete Metasploit guide : explore effective penetration testing techniques with Metasploit / Sa
Axe ProQuest E-Book:Available
|
|
2019
|
26 additional entries
|
|
|
|
Computer Security Management Evaluation : United States.
|
|
|
Priority open recommendations: Securities and Exchange Commission.
Axe Federal Documents Online:Available
|
|
2023
|
|
Computer Security Management Examinations Study Guides
|
|
|
Official (ISC)² guide to the ISSMP CBK / edited by Harold F. Tipton.
Axe ProQuest E-Book:Available
|
|
2011
|
|
Computer Security Management Handbooks Manuals Etc
|
|
|
Information security management handbook / Vol. 2 Harold F. Tipton, Micki Krause, editors. Vol. 2.
Axe 2nd Floor Stacks:Missing
|
|
2004
|
Information security management handbook. Volume 5 [electronic resource] / edited by Harold F. Tipton
Axe ProQuest E-Book:Available
|
|
2012
|
Information security management handbook. Volume 6 [electronic resource] / edited by Harold F. Tipton
Axe ProQuest E-Book:Available
|
|
2012
|
Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2006
|
Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers
Axe ProQuest E-Book:Available
|
|
2006
|
|
Computer Security Management Standards
|
|
|
The case for ISO27001 : 2013 / Alan Calder.
Axe ProQuest E-Book:Available
|
|
2013
|
Information security breaches : avoidance and treatment based on ISO27001 / Michael Krausz.
Axe ProQuest E-Book:Available
|
|
2009
|
|
Computer Security Mathematical Models : Brand, John H,
|
|
|
A proposed modeling protocol for evaluating information attacks / John H. Brand II.
Axe Federal Documents Online:Available
|
|
1999-
|
|
Computer Security Mathematics
|
|
|
Cybersecurity and applied mathematics / Leigh Metcalf, William Casey.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2016
|
Security of block ciphers : from algorithm design to hardware implementation / Kazuo Sakiyama, Yu Sas
Axe ProQuest E-Book:Available
|
|
2015
|
|
Computer Security Moral And Ethical Aspects : Digital Enlightenment Forum,
|
|
|
Security for the digital world within an ethical framework / by the Digital Enlightenment Forum.
Axe ProQuest E-Book:Available
|
|
2016
|
|
Computer Security Moral And Ethical Aspects United States Case Studies : Johnston, Jessica R.,
|
|
|
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jes
Axe ProQuest E-Book:Available
|
|
2009
|
|
Computer Security New Mexico Los Alamos : United States.
|
|
|
Continuing security concerns at Los Alamos National Laboratory [electronic resource] : hearings befor
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
|
Computer Security Periodicals
|
|
|
ACM transactions on information and system security.
Axe Basement Bound Periodicals :Available, Axe Basement Current Periodicals :Available
|
|
1998
|
Journal of cyber security & information systems.
Axe Federal Documents Online:Available
|
|
2012
|
|
Computer Security Psychological Aspects : Zinatullin, Leron,
|
|
|
The psychology of information security : resolving conflicts between security compliance and human be
Axe ProQuest E-Book:Available
|
|
2016
|
|
Computer Security Research
|
|
|
Cybersecurity in humanities and social sciences : a research methods approach / edited by Hugo Loisea
Axe ProQuest E-Book:Available
|
|
2020
|
Perspectives on cybersecurity / Jakub Drmola.
Axe ProQuest E-Book:Available
|
|
2015
|
|
Computer Security Research United States
|
|
|
Cyber security R&D : hearing before the Subcommittee on Research and Science Education, Committee on
Axe Federal Documents Online:Available
|
|
2009
|
Cybersecurity research and development : challenges and solutions : hearing before the Subcommittee o
Axe Federal Documents Online:Available
|
|
2013
|
Information security [electronic resource] : coordination of federal cyber security research and deve
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
Computer Security Research United States Finance : United States.
|
|
|
S. 2037, S. 2182, homeland security and the technology sector : hearing before the Subcommittee on Sc
Axe Federal Documents Online:Available
|
|
2004
|
|
Computer Security Risk Management : United States.
|
|
|
Cybersecurity: State needs to expeditiously implement risk management and other key practices : repor
Axe Federal Documents Online:Available
|
|
2023
|
|
Computer Security Russia Federation : Petrenko, Sergei,
|
|
|
Cyber security innovation for the digital economy : a case study of the Russian Federation / Sergei P
Axe ProQuest E-Book:Available
|
|
2018
|
|
Computer Security Security Measures : El-Bawab, Abd El-Monem A.,
|
|
|
Untangle network security : secure your network against threats and vulnerabilities using the unparal
Axe ProQuest E-Book:Available
|
|
2014
|
Add Marked to Bag
Add All On Page
|