Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Subjects (1-23 of 23)
Computer Security Handbooks Manuals Etc
1
E-Book/E-Doc
 

The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital o


Wallace, Michael, 1960-
New York : American Management Association, c2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
2
E-Book/E-Doc
 

Guide to intrusion detection and prevention systems (IDPS) recommendations of the National Institute


Kent, Karen (Karen Ann)
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-94    ---  Available
3
E-Book/E-Doc
 

Handbook on securing cyber-physical critical infrastructure



Waltham, MA : Morgan Kaufmann, ©2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
4
E-Book/E-Doc
 

Handbook on securing cyber-physical critical infrastructure



Waltham, Mass. : Elsevier/Morgan Kaufmann, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
5
E-Book/E-Doc
 

Programmer's ultimate security deskref


Foster, James C.
Rockland, MA : Syngress Pub., ©2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
6
E-Book/E-Doc
 

Scene of the cybercrime : computer forensics handbook


Shinder, Debra Littlejohn, author.
Rockland, MA : Syngress Pub., ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
7
E-Book/E-Doc
 

Secure hash standard


National Institute of Standards and Technology (U.S.)
Gaithersburg, MD : Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, [2002] 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.52:180-2    ---  Available
8
E-Book/E-Doc
 

Secure hash standard (SHS)


National Institute of Standards and Technology (U.S.)
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012] 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.52:180-4    ---  Available
9
Print Material
 

The Secure online business handbook : e-Commerce, IT functionality, & business continuity



London ; Sterling, Va. : Kogan Page, c2004. 2004

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.8 Se26 2004    ---  Available
10
E-Book/E-Doc
 

Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security pro


Foster, James C.
Rockland, MA : Syngress Pub. ; [Sebastopol, CA] : Distributed by O'Reilly Media in the United States and Canada, ©2005. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
11
E-Book/E-Doc
 

Thor's Microsoft security bible : a collection of practical security techniques


Mullen, Timothy M.
Waltham, MA : Syngress, ©2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
12
E-Book/E-Doc
 

Writing security tools and exploits


Foster, James C.
Rockland, MA : Syngress, ©2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
13
E-Book/E-Doc
 

Writing security tools and exploits


Foster, James C.
Rockland, MA : Syngress, c2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Computer Security History
14
E-Book/E-Doc
 

The history of information security : a comprehensive handbook



Amsterdam ; Oxford : Elsevier, 2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Computer Security Industrial Applications United States
15
E-Book/E-Doc
 

Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA


Stouffer, Keith.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-82/DRAFT/FINAL    ---  Available
16
E-Book/E-Doc
 

Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA


Stouffer, Keith.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-82/DRAFT/REV.    ---  Available
Computer Security Information Resources Management United States
17
Print Material
 

DOD cybersecurity : enhanced attention needed to ensure cyber incidents are appropriately reported a


United States. Government Accountability Office, author.
Washington, DC : United States Government Accountability Office, 2022. 2022

Rating:

Copies

Computer Security Information Services
18
E-Book/E-Doc
 

Roadmap to NIST information security documents



[Gaithersburg, Md.] : National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce, Computer Security Division, Information Technology Laboratory, [2006] 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.2:SE 2/4    ---  Available
Computer Security International Cooperation
19
E-Book/E-Doc
 

Cyberterrorism and computer crimes : issues surrounding the establishment of an international regime


Aldrich, Richard W., 1959-
[Colorado Springs], Colo. : USAF Institute for National Security Studies, 2000. 2000

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 305.24:2001001088    ---  Available
20
E-Book/E-Doc
 

Information warfare arms control risks and costs


Thom, Maxie C.
USAF Academy, Colo. : USAF Institute for National Security Studies, [2006] 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 305.24:63    ---  Available
21
E-Book/E-Doc
 

Sharing the knowledge : government-private sector partnerships to enhance information security


Rinaldi, Steven M.
[Colorado Springs, Colo.] : USAF Institute for National Security Studies, [2000] 2000

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 305.24:33    ---  Available
22
E-Book/E-Doc
 

United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 5


United States. Congress. House. Committee on Homeland Security, author.
[Washington, D.C.] : [U. S. Government Publishing Office], [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/8:114-826    ---  Available
Computer Security Juvenile Literature
23
Print Material
 

Digital data security


Hudak, Heather C., 1975- author.
New York : Crabtree Publishing Company, [2019] 2019

Rating:

 

Copies

Location Call No. OPAC Message Status
 Pittsburg 1st Fl Young Adult Non-Fiction  YA 005.8 Hud    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only