Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Result Page   
Add Marked to Bag Add All On Page
Num Mark Subjects (1-50 of 107) Media Year
1   Computer Security -- 3 Related Subjects    
2 Computer Security    
      24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David L Axe 3rd Floor Stacks:Available   Print Material 2010
      88 privacy breaches to beware of : practical data protection tips from real-life experiences / Kevin Axe ProQuest E-Book:Available   Electronic Book 2016
      99 privacy breaches to beware of : practical data protection tips from real-life experiences / Kevin Axe ProQuest E-Book:Available   Electronic Book 2018
      Adaptive security management architecture [electronic resource] / James S. Tiller. Axe ProQuest E-Book:Available   Electronic Book 2010
577 additional entries    
3 Computer Security Arctic Regions      
      Cybersecurity and resilience in the arctic / edited by Benjamin D. Trump, Kamrul Hossain, Igor Linkov Axe ProQuest E-Book:Available   Electronic Book 2020
4 Computer Security Automation Government Policy United States      
      Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 [electronic r Axe Federal Documents Online:Available   ElectronicResource GovDoc 2010
5 Computer Security Awards United States : United States.     
      President's Cup Cybersecurity Competition Act : report of the Committee on Homeland Security and Gove Axe Federal Documents Online:Available   Electronic Book 2023
6 Computer Security Bibliography    
      Open source bibliography [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 1997
      Resolved, the United States federal government should substantially increase its security cooperation Axe Federal Documents Online:Available   Electronic Book 2022
7 Computer Security California Laguna Niguel    
      Technical security evaluation of U.S. citizenship and Immigration services activities at the Chet Hol Axe Federal Documents Online:Available   ElectronicResource GovDoc 2007
      Technical security evaluation of U.S. Immigration and Customs Enforcement activities at the Chet Holi Axe Federal Documents Online:Available   ElectronicResource GovDoc 2008
8 Computer Security Case Studies    
      The new forensics : investigating corporate fraud and the theft of intellectual property / Joe Anasta Axe 3rd Floor Stacks:Available   Print Material 2003
      Test results for disk imaging tools [electronic resource] : dd provided with FreeBSD 4.4. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2004
9 Computer Security China    
      Chinese state-sponsored actors exploit publicly known vulnerabilities. Axe Federal Documents Online:Available   Electronic Book 2020
      Wired China : who's hand is on the switch : roundtable before the Congressional-Executive Commission Axe Federal Documents Online:Available   Electronic Book 2002
10 Computer Security China History      
      Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen. Axe 3rd Floor Stacks:Available   Print Material 2004
11 Computer Security Comic Books Strips Etc : Watts, Clint,     
      Resilience series : real fake / commissioned by the Cybersecurity and Infrastructure Security Agency, Axe Federal Documents Online:Available   Print Material 2020
12 Computer Security Computer Programs    
      Check Point Next Generation with application intelligence security administration / Chris Tobkin ; Da Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2004
      Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting / Jim Noble [and others] Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2003
      Check Point NG VPN-1/Firewall-1 [electronic resource] : advanced configuration and troubleshooting / Axe ProQuest E-Book:Available   Electronic Book 2003
      Configuring Check Point NGX VPN-1/FireWall-1 [electronic resource] / Robert Stephens ... [et al.] ; f Axe ProQuest E-Book:Available   Electronic Book 2005
2 additional entries    
13 Computer Security Congresses    
      Algorithms, architectures and information systems security [electronic resource] / editors, Bhargab B Axe ProQuest E-Book:Available   Electronic Book 2009
      Beyond spectre : confronting new technical and policy challenges : proceedings of a workshop / The Na Axe ProQuest E-Book:Available   Electronic Book 2019
      Boolean functions in cryptology and information security [electronic resource] / edited by Bart Prene Axe ProQuest E-Book:Available   Electronic Book 2008
      Comprehensive approach as 'sine qua non' for critical infrastructure protection / [edited by] Denis C Axe ProQuest E-Book:Available   Electronic Book 2015
19 additional entries    
14 Computer Security Data Processing      
      Machine learning for computer and cyber security : principles, algorithms, and practices / editors Br Axe ProQuest E-Book:Available   Electronic Book 2019
15 Computer Security Databases      
      National Vulnerability Database [electronic resource] : automating vulnerability management security Axe Federal Documents Online:Available   ElectronicResource GovDoc 19--
16 Computer Security Dictionaries : Slade, Robert.     
      Dictionary of information security [electronic resource] / Robert Slade. Axe ProQuest E-Book:Available   Electronic Book 2006
17 Computer Security Encyclopedias      
      Encyclopedia of cybercrime / edited by Samuel C. McQuade, III. Axe 3rd Floor Stacks:Available   Print Material 2009
18 Computer Security Equipment Industry Corrupt Practices      
      "Free security scan" could cost time and money [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2008
19 Computer Security Equipment Industry Directories      
      Enterprise directory and security implementation guide : designing and implementing directories in yo Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2002
20 Computer Security Equipment Industry Vocational Guidance : More, Josh,     
      Breaking into information security : crafting a custom career path to get the job you really want / J Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2015
21 Computer Security European Union Countries : Kosta, Eleni.     
      Consent in European data protection law [electronic resource] / by Eleni Kosta. Axe ProQuest E-Book:Available   Electronic Book 2013
22 Computer Security Evaluation    
      BackTrack 4 [electronic resource] : assuring security by penetration testing : master the art of pene Axe ProQuest E-Book:Available   Electronic Book 2011
      Critical infrastructure protection [electronic resource] : significant challenges in developing analy Axe Federal Documents Online:Available   ElectronicResource GovDoc 2001
      Network security evaluation using the NSA IEM / Russ Rogers, technical editor and contributor ; Bryan Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2005
      The network security test lab : a step-by-step guide / Michael Gregg. Axe ProQuest E-Book:Available   Electronic Book 2015
      Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others]. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2004
23 Computer Security Evaluation Methodology    
      Network security assessment [electronic resource] : from vulnerability to patch / Steve Manzuik, Andr Axe ProQuest E-Book:Available   Electronic Book 2007
      Network security assessment : from vulnerability to patch / Steve Manzuik, André Gold, Chris Gatford. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2007
24 Computer Security Examinations : Sohaib, Mohd,     
      Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing includin Axe ProQuest E-Book:Available   Electronic Book 2022
25 Computer Security Examinations Practice : Wilhelm, Thomas.     
      Professional penetration testing : creating and operating a formal hacking lab / by Thomas Wilhelm. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2010
26 Computer Security Examinations Study Guides    
      CASP [electronic resource] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / Mich Axe ProQuest E-Book:Available   Electronic Book 2012
      CEH [electronic resource] : certified ethical hacker study guide / Kimberly Graves. Axe ProQuest E-Book:Available   Electronic Book 2010
      CISSP [electronic resource] : Certified Information Systems Security Professional study guide / James Axe ProQuest E-Book:Available   Electronic Book 2005
      CISSP [electronic resource] : Certified Information systems Security Professional ; study guide / Jam Axe ProQuest E-Book:Available   Electronic Book 2008
17 additional entries    
27 Computer Security Fiction    
      Cyber breaching : combat engineer operations in a cyber world / by Jonathan Bratten. Axe Federal Documents Online:Lib Use Only   Print Material 2016
      Digital fortress / Dan Brown. Pittsburg 2nd Fl Fiction:Available   Print Material 2004
      Stealing the network [electronic resource] : how to own a continent / Russ Rogers ... [et al.]; Ryan Axe ProQuest E-Book:Available   Electronic Book 2004
      Stealing the network [electronic resource] : how to own a shadow / Johnny Long, Timothy (Thor) Mulle Axe ProQuest E-Book:Available   Electronic Book 2007
8 additional entries    
28 Computer Security Forecasting : Howard, Doug.     
      Security 2020 [electronic resource] : reduce security risks this decade / Doug Howard and Kevin Princ Axe ProQuest E-Book:Available   Electronic Book 2011
29 Computer Security Government Policy    
      Cyber security policy guidebook [electronic resource] / Jennifer L. Bayuk ... [et al.]. Axe ProQuest E-Book:Available   Electronic Book 2012
      Rewired cybersecurity governance / edited by Ryan Ellis and Vivek Mohan. Axe ProQuest E-Book:Available   Electronic Book 2019
30 Computer Security Government Policy Caribbean Area : Saavedra Pérez, Boris Omar,     
      Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat Axe Federal Documents Online:Lib Use Only   Print Material 2017
31 Computer Security Government Policy Kansas      
      Department of Administration's SHaRP system : reviewing the upgrading of that system / conducted by A Axe Archives Kansas Documents:Available   Print Material 2004
32 Computer Security Government Policy Latin America : Saavedra Pérez, Boris Omar,     
      Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat Axe Federal Documents Online:Lib Use Only   Print Material 2017
33 Computer Security Government Policy United States    
      Assessing cybersecurity activities at NIST and DHS : hearing before the Subcommittee on Technology an Axe Federal Documents Online:Available   Electronic Book 2009
      Balancing privacy and innovation [electronic resource] : does the president's proposal tip the scale? Axe Federal Documents Online:Available   ElectronicResource GovDoc 2013
      Big data : privacy risks and needed reform in the public and private sectors : hearing before the Com Axe Federal Documents Online:Available   Electronic Book 2022
      The Comprehensive National Cybersecurity Initiative. Axe Federal Documents Online:Available   Electronic Book 2010
102 additional entries    
34 Computer Security Government Policy United States Evaluation    
      Additional department oversight can improve DHS' intelligence systems security program [electronic re Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
      DHS has made improvements on the security program for its intelligence systems [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
      Evaluation of DHS' information security program for fiscal year 2010 [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2010
      Homeland Security Information Network could support information sharing more effectively [electronic Axe Federal Documents Online:Available   ElectronicResource GovDoc 2006
10 additional entries    
35 Computer Security Government Policy United States Periodicals : National Science and Technology Council (U.S.).     
      Federal cybersecurity research and development strategic plan / prepared by the Cyber Security and In Axe Federal Documents Online:Available   Print Material 2019
36 Computer Security Handbooks Manuals Etc    
      The disaster recovery handbook [electronic resource] : a step-by-step plan to ensure business continu Axe ProQuest E-Book:Available   Electronic Book 2004
      Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of Axe Federal Documents Online:Available   ElectronicResource GovDoc 2007
      Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2012
      Handbook on securing cyber-physical critical infrastructure [electronic resource] / Sajal Das, Krishn Axe ProQuest E-Book:Available   Electronic Book 2012
9 additional entries    
37 Computer Security History      
      The history of information security : a comprehensive handbook / edited by Karl De Leeuw and Jan Berg Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2007
38 Computer Security Industrial Applications United States    
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) Axe Federal Documents Online:Available   Electronic Book 2008
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) Axe Federal Documents Online:Available   Electronic Book 2007
39 Computer Security Information Services      
      Roadmap to NIST information security documents [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2006
40 Computer Security International Cooperation    
      Cyberterrorism and computer crimes : issues surrounding the establishment of an international regime Axe Federal Documents Online:Available   ElectronicResource GovDoc 2000
      Information warfare arms control [electronic resource] : risks and costs / Maxie C. Thom. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2006
      Sharing the knowledge : government-private sector partnerships to enhance information security / Stev Axe Federal Documents Online:Available   ElectronicResource GovDoc 2000
      United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58 Axe Federal Documents Online:Available   Electronic Book 2016
41 Computer Security Juvenile Literature : Hudak, Heather C.,     
      Digital data security / Heather C. Hudak. Pittsburg 1st Fl Young Adult Non-Fiction:Available   Print Material 2019
42 Computer Security Kansas Auditing    
      State agency information systems : reviewing selected security controls in state agencies / [conducte Axe Archives Kansas Documents:Available   Print Material 2009
      State agency information systems : reviewing the Kansas Health Policy Authority's management of those Axe Archives Kansas Documents:Available   Print Material 2008
      Surplus computer equipment : determining whether state agencies effectively remove software and agenc Axe Archives Kansas Documents:Available   Print Material 2008
43 Computer Security Law And Legislation    
      Cybersecurity law, standards and regulations / Tari Schreider ; Kristen Noakes-Fry, editor. Axe ProQuest E-Book:Available   Electronic Book 2020
      I dati personali nel diritto Europeo / a cura di Vincenzo Cuffaro, Roberto D'Orazio, Vincenzo Ricciut Axe ProQuest E-Book:Available   Electronic Book 2019
      Lessons from the identity trail [electronic resource] : anonymity, privacy and identity in a networke Axe ProQuest E-Book:Available   Electronic Book 2009
      The manager's guide to cybersecurity law : essentials for today's business / Tari Schreider, Kristen Axe ProQuest E-Book:Available   Electronic Book 2017
      Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countries Axe ProQuest E-Book:Available   Electronic Book 2014
44 Computer Security Law And Legislation Australia : Sullivan, Clare.     
      Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi Axe JSTOR Open Ebooks:Available   Electronic Book 2011
45 Computer Security Law And Legislation Canada : Canada.     
      Scientific cooperation [electronic resource] : agreement between the United States of America and Can Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
46 Computer Security Law And Legislation Europe : Leisterer, Hannfried.     
      Internetsicherheit in Europa : Zur Gewährleistung der Netz- und Informationssicherheit durch Informat Axe JSTOR Open Ebooks:Available   Electronic Book 2018-
47 Computer Security Law And Legislation European Union Countries    
      Aviation Cybersecurity : Regulatory Approach in the European Union / Benjamyn I. Scott. Axe ProQuest E-Book:Available   Electronic Book 2019
      Sicherheit als Grundsatz : eine grundrechtsdogmatische Rekonstruktion im Unionsrecht am Beispiel der Axe JSTOR Open Ebooks:Available   Electronic Book 2017
48 Computer Security Law And Legislation Great Britain : Sullivan, Clare.     
      Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi Axe JSTOR Open Ebooks:Available   Electronic Book 2011
49 Computer Security Law And Legislation Israel : United States.     
      United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58 Axe Federal Documents Online:Available   Electronic Book 2016
50 Computer Security Law And Legislation Singapore : Singapore.     
      Defense [electronic resource] : cooperation : agreement between the United States of America and Sing Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
Add Marked to Bag Add All On Page
Locate in results
Result Page   
 
    
Available items only