|
1
|
|
Computer Security
--
3 Related Subjects
|
|
|
2
|
|
Computer Security
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David L
Axe 3rd Floor Stacks:Available
|
|
2010
|
88 privacy breaches to beware of : practical data protection tips from real-life experiences / Kevin
Axe ProQuest E-Book:Available
|
|
2016
|
99 privacy breaches to beware of : practical data protection tips from real-life experiences / Kevin
Axe ProQuest E-Book:Available
|
|
2018
|
Adaptive security management architecture [electronic resource] / James S. Tiller.
Axe ProQuest E-Book:Available
|
|
2010
|
577 additional entries
|
|
|
3
|
|
Computer Security Arctic Regions
|
|
|
Cybersecurity and resilience in the arctic / edited by Benjamin D. Trump, Kamrul Hossain, Igor Linkov
Axe ProQuest E-Book:Available
|
|
2020
|
4
|
|
Computer Security Automation Government Policy United States
|
|
|
Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 [electronic r
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
5
|
|
Computer Security Awards United States : United States.
|
|
|
President's Cup Cybersecurity Competition Act : report of the Committee on Homeland Security and Gove
Axe Federal Documents Online:Available
|
|
2023
|
6
|
|
Computer Security Bibliography
|
|
|
Open source bibliography [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
1997
|
Resolved, the United States federal government should substantially increase its security cooperation
Axe Federal Documents Online:Available
|
|
2022
|
7
|
|
Computer Security California Laguna Niguel
|
|
|
Technical security evaluation of U.S. citizenship and Immigration services activities at the Chet Hol
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Technical security evaluation of U.S. Immigration and Customs Enforcement activities at the Chet Holi
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
8
|
|
Computer Security Case Studies
|
|
|
The new forensics : investigating corporate fraud and the theft of intellectual property / Joe Anasta
Axe 3rd Floor Stacks:Available
|
|
2003
|
Test results for disk imaging tools [electronic resource] : dd provided with FreeBSD 4.4.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2004
|
9
|
|
Computer Security China
|
|
|
Chinese state-sponsored actors exploit publicly known vulnerabilities.
Axe Federal Documents Online:Available
|
|
2020
|
Wired China : who's hand is on the switch : roundtable before the Congressional-Executive Commission
Axe Federal Documents Online:Available
|
|
2002
|
10
|
|
Computer Security China History
|
|
|
Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen.
Axe 3rd Floor Stacks:Available
|
|
2004
|
11
|
|
Computer Security Comic Books Strips Etc : Watts, Clint,
|
|
|
Resilience series : real fake / commissioned by the Cybersecurity and Infrastructure Security Agency,
Axe Federal Documents Online:Available
|
|
2020
|
12
|
|
Computer Security Computer Programs
|
|
|
Check Point Next Generation with application intelligence security administration / Chris Tobkin ; Da
Axe Elsevier ScienceDirect Ebook:Available
|
|
2004
|
Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting / Jim Noble [and others]
Axe Elsevier ScienceDirect Ebook:Available
|
|
2003
|
Check Point NG VPN-1/Firewall-1 [electronic resource] : advanced configuration and troubleshooting /
Axe ProQuest E-Book:Available
|
|
2003
|
Configuring Check Point NGX VPN-1/FireWall-1 [electronic resource] / Robert Stephens ... [et al.] ; f
Axe ProQuest E-Book:Available
|
|
2005
|
2 additional entries
|
|
|
13
|
|
Computer Security Congresses
|
|
|
Algorithms, architectures and information systems security [electronic resource] / editors, Bhargab B
Axe ProQuest E-Book:Available
|
|
2009
|
Beyond spectre : confronting new technical and policy challenges : proceedings of a workshop / The Na
Axe ProQuest E-Book:Available
|
|
2019
|
Boolean functions in cryptology and information security [electronic resource] / edited by Bart Prene
Axe ProQuest E-Book:Available
|
|
2008
|
Comprehensive approach as 'sine qua non' for critical infrastructure protection / [edited by] Denis C
Axe ProQuest E-Book:Available
|
|
2015
|
19 additional entries
|
|
|
14
|
|
Computer Security Data Processing
|
|
|
Machine learning for computer and cyber security : principles, algorithms, and practices / editors Br
Axe ProQuest E-Book:Available
|
|
2019
|
15
|
|
Computer Security Databases
|
|
|
National Vulnerability Database [electronic resource] : automating vulnerability management security
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
19--
|
16
|
|
Computer Security Dictionaries : Slade, Robert.
|
|
|
Dictionary of information security [electronic resource] / Robert Slade.
Axe ProQuest E-Book:Available
|
|
2006
|
17
|
|
Computer Security Encyclopedias
|
|
|
Encyclopedia of cybercrime / edited by Samuel C. McQuade, III.
Axe 3rd Floor Stacks:Available
|
|
2009
|
18
|
|
Computer Security Equipment Industry Corrupt Practices
|
|
|
"Free security scan" could cost time and money [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
19
|
|
Computer Security Equipment Industry Directories
|
|
|
Enterprise directory and security implementation guide : designing and implementing directories in yo
Axe Elsevier ScienceDirect Ebook:Available
|
|
2002
|
20
|
|
Computer Security Equipment Industry Vocational Guidance : More, Josh,
|
|
|
Breaking into information security : crafting a custom career path to get the job you really want / J
Axe Elsevier ScienceDirect Ebook:Available
|
|
2015
|
21
|
|
Computer Security European Union Countries : Kosta, Eleni.
|
|
|
Consent in European data protection law [electronic resource] / by Eleni Kosta.
Axe ProQuest E-Book:Available
|
|
2013
|
22
|
|
Computer Security Evaluation
|
|
|
BackTrack 4 [electronic resource] : assuring security by penetration testing : master the art of pene
Axe ProQuest E-Book:Available
|
|
2011
|
Critical infrastructure protection [electronic resource] : significant challenges in developing analy
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Network security evaluation using the NSA IEM / Russ Rogers, technical editor and contributor ; Bryan
Axe Elsevier ScienceDirect Ebook:Available
|
|
2005
|
The network security test lab : a step-by-step guide / Michael Gregg.
Axe ProQuest E-Book:Available
|
|
2015
|
Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others].
Axe Elsevier ScienceDirect Ebook:Available
|
|
2004
|
23
|
|
Computer Security Evaluation Methodology
|
|
|
Network security assessment [electronic resource] : from vulnerability to patch / Steve Manzuik, Andr
Axe ProQuest E-Book:Available
|
|
2007
|
Network security assessment : from vulnerability to patch / Steve Manzuik, André Gold, Chris Gatford.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
24
|
|
Computer Security Examinations : Sohaib, Mohd,
|
|
|
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing includin
Axe ProQuest E-Book:Available
|
|
2022
|
25
|
|
Computer Security Examinations Practice : Wilhelm, Thomas.
|
|
|
Professional penetration testing : creating and operating a formal hacking lab / by Thomas Wilhelm.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2010
|
26
|
|
Computer Security Examinations Study Guides
|
|
|
CASP [electronic resource] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / Mich
Axe ProQuest E-Book:Available
|
|
2012
|
CEH [electronic resource] : certified ethical hacker study guide / Kimberly Graves.
Axe ProQuest E-Book:Available
|
|
2010
|
CISSP [electronic resource] : Certified Information Systems Security Professional study guide / James
Axe ProQuest E-Book:Available
|
|
2005
|
CISSP [electronic resource] : Certified Information systems Security Professional ; study guide / Jam
Axe ProQuest E-Book:Available
|
|
2008
|
17 additional entries
|
|
|
27
|
|
Computer Security Fiction
|
|
|
Cyber breaching : combat engineer operations in a cyber world / by Jonathan Bratten.
Axe Federal Documents Online:Lib Use Only
|
|
2016
|
Digital fortress / Dan Brown.
Pittsburg 2nd Fl Fiction:Available
|
|
2004
|
Stealing the network [electronic resource] : how to own a continent / Russ Rogers ... [et al.]; Ryan
Axe ProQuest E-Book:Available
|
|
2004
|
Stealing the network [electronic resource] : how to own a shadow / Johnny Long, Timothy (Thor) Mulle
Axe ProQuest E-Book:Available
|
|
2007
|
8 additional entries
|
|
|
28
|
|
Computer Security Forecasting : Howard, Doug.
|
|
|
Security 2020 [electronic resource] : reduce security risks this decade / Doug Howard and Kevin Princ
Axe ProQuest E-Book:Available
|
|
2011
|
29
|
|
Computer Security Government Policy
|
|
|
Cyber security policy guidebook [electronic resource] / Jennifer L. Bayuk ... [et al.].
Axe ProQuest E-Book:Available
|
|
2012
|
Rewired cybersecurity governance / edited by Ryan Ellis and Vivek Mohan.
Axe ProQuest E-Book:Available
|
|
2019
|
30
|
|
Computer Security Government Policy Caribbean Area : Saavedra Pérez, Boris Omar,
|
|
|
Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat
Axe Federal Documents Online:Lib Use Only
|
|
2017
|
31
|
|
Computer Security Government Policy Kansas
|
|
|
Department of Administration's SHaRP system : reviewing the upgrading of that system / conducted by A
Axe Archives Kansas Documents:Available
|
|
2004
|
32
|
|
Computer Security Government Policy Latin America : Saavedra Pérez, Boris Omar,
|
|
|
Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat
Axe Federal Documents Online:Lib Use Only
|
|
2017
|
33
|
|
Computer Security Government Policy United States
|
|
|
Assessing cybersecurity activities at NIST and DHS : hearing before the Subcommittee on Technology an
Axe Federal Documents Online:Available
|
|
2009
|
Balancing privacy and innovation [electronic resource] : does the president's proposal tip the scale?
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2013
|
Big data : privacy risks and needed reform in the public and private sectors : hearing before the Com
Axe Federal Documents Online:Available
|
|
2022
|
The Comprehensive National Cybersecurity Initiative.
Axe Federal Documents Online:Available
|
|
2010
|
102 additional entries
|
|
|
34
|
|
Computer Security Government Policy United States Evaluation
|
|
|
Additional department oversight can improve DHS' intelligence systems security program [electronic re
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
DHS has made improvements on the security program for its intelligence systems [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Evaluation of DHS' information security program for fiscal year 2010 [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
Homeland Security Information Network could support information sharing more effectively [electronic
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
10 additional entries
|
|
|
35
|
|
Computer Security Government Policy United States Periodicals : National Science and Technology Council (U.S.).
|
|
|
Federal cybersecurity research and development strategic plan / prepared by the Cyber Security and In
Axe Federal Documents Online:Available
|
|
2019
|
36
|
|
Computer Security Handbooks Manuals Etc
|
|
|
The disaster recovery handbook [electronic resource] : a step-by-step plan to ensure business continu
Axe ProQuest E-Book:Available
|
|
2004
|
Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi
Axe Elsevier ScienceDirect Ebook:Available
|
|
2012
|
Handbook on securing cyber-physical critical infrastructure [electronic resource] / Sajal Das, Krishn
Axe ProQuest E-Book:Available
|
|
2012
|
9 additional entries
|
|
|
37
|
|
Computer Security History
|
|
|
The history of information security : a comprehensive handbook / edited by Karl De Leeuw and Jan Berg
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
38
|
|
Computer Security Industrial Applications United States
|
|
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2008
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2007
|
39
|
|
Computer Security Information Services
|
|
|
Roadmap to NIST information security documents [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
40
|
|
Computer Security International Cooperation
|
|
|
Cyberterrorism and computer crimes : issues surrounding the establishment of an international regime
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
Information warfare arms control [electronic resource] : risks and costs / Maxie C. Thom.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Sharing the knowledge : government-private sector partnerships to enhance information security / Stev
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58
Axe Federal Documents Online:Available
|
|
2016
|
41
|
|
Computer Security Juvenile Literature : Hudak, Heather C.,
|
|
|
Digital data security / Heather C. Hudak.
Pittsburg 1st Fl Young Adult Non-Fiction:Available
|
|
2019
|
42
|
|
Computer Security Kansas Auditing
|
|
|
State agency information systems : reviewing selected security controls in state agencies / [conducte
Axe Archives Kansas Documents:Available
|
|
2009
|
State agency information systems : reviewing the Kansas Health Policy Authority's management of those
Axe Archives Kansas Documents:Available
|
|
2008
|
Surplus computer equipment : determining whether state agencies effectively remove software and agenc
Axe Archives Kansas Documents:Available
|
|
2008
|
43
|
|
Computer Security Law And Legislation
|
|
|
Cybersecurity law, standards and regulations / Tari Schreider ; Kristen Noakes-Fry, editor.
Axe ProQuest E-Book:Available
|
|
2020
|
I dati personali nel diritto Europeo / a cura di Vincenzo Cuffaro, Roberto D'Orazio, Vincenzo Ricciut
Axe ProQuest E-Book:Available
|
|
2019
|
Lessons from the identity trail [electronic resource] : anonymity, privacy and identity in a networke
Axe ProQuest E-Book:Available
|
|
2009
|
The manager's guide to cybersecurity law : essentials for today's business / Tari Schreider, Kristen
Axe ProQuest E-Book:Available
|
|
2017
|
Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countries
Axe ProQuest E-Book:Available
|
|
2014
|
44
|
|
Computer Security Law And Legislation Australia : Sullivan, Clare.
|
|
|
Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi
Axe JSTOR Open Ebooks:Available
|
|
2011
|
45
|
|
Computer Security Law And Legislation Canada : Canada.
|
|
|
Scientific cooperation [electronic resource] : agreement between the United States of America and Can
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
46
|
|
Computer Security Law And Legislation Europe : Leisterer, Hannfried.
|
|
|
Internetsicherheit in Europa : Zur Gewährleistung der Netz- und Informationssicherheit durch Informat
Axe JSTOR Open Ebooks:Available
|
|
2018-
|
47
|
|
Computer Security Law And Legislation European Union Countries
|
|
|
Aviation Cybersecurity : Regulatory Approach in the European Union / Benjamyn I. Scott.
Axe ProQuest E-Book:Available
|
|
2019
|
Sicherheit als Grundsatz : eine grundrechtsdogmatische Rekonstruktion im Unionsrecht am Beispiel der
Axe JSTOR Open Ebooks:Available
|
|
2017
|
48
|
|
Computer Security Law And Legislation Great Britain : Sullivan, Clare.
|
|
|
Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi
Axe JSTOR Open Ebooks:Available
|
|
2011
|
49
|
|
Computer Security Law And Legislation Israel : United States.
|
|
|
United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58
Axe Federal Documents Online:Available
|
|
2016
|
50
|
|
Computer Security Law And Legislation Singapore : Singapore.
|
|
|
Defense [electronic resource] : cooperation : agreement between the United States of America and Sing
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Add Marked to Bag
Add All On Page
|