Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Result Page   
Add Marked to Bag Add All On Page
Alternate Subjects (351-400 of 495)
Computer Networks Security Measures
351
E-Book/E-Doc
 

Computer and information security handbook



Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013] 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
352
Print Material
 

Computer forensics jumpstart


Solomon, Michael (Michael G.), 1963-
Indianapolis, Indiana : Wiley Publishing, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.8 So47c 2011    ---  Available
353
E-Book/E-Doc
 

Computer networks and information warfare : implications for military operations


Gruber, David J.
Maxwell Air Force Base, Ala. : Center for Strategy and Technology, Air War College, Air University, [2000] 2000

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 301.26/26:17    ---  Available
354
E-Book/E-Doc
 

Configuring Check Point NGX VPN-1/fire wall-


Stephens, Robert.
Rockland, MA : Syngress Pub., ©2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
355
E-Book/E-Doc
 

Configuring Juniper Networks NetScreen & SSG firewalls



Rockland, Mass. : Syngress Pub., ©2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
356
E-Book/E-Doc
 

Configuring SonicWALL firewalls



Rockland, MA : Syngress Pub., ©2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
357
E-Book/E-Doc
 

Configuring Symantec Antivirus, Corporate Edition



Rockland, Mass. : Syngress, ©2003. 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
358
Print Material
 

Continuation of the national emergency with respect to securing the information and communications t


United States. President (2017-2021 : Trump), author.
Washington : U.S. Government Publishing Office, 2020. 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/7:116-129    ---  Available
359
Print Material
 

Continuation of the national emergency with respect to securing the information and communications t


United States. President (2021- : Biden), author.
Washington : U.S. Government Publishing Office, 2021. 2021

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/7:117-38    ---  Available
360
Print Material
 

Contractor-produced report : CSB is at increased risk of losing significant data and is vulnerable t


United States. Environmental Protection Agency. Office of the Inspector General, author.
Washington, D.C. : Office of Inspector General, U.S. Environmental Protection Agency, 2022. 2022

Rating:

Copies

361
E-Book/E-Doc
 

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
362
E-Book/E-Doc
 

Cyber adversary characterization : auditing the hacker mind



Rockland, MA : Syngress, [2004] 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
363
E-Book/E-Doc
 

Cyber guerilla


Haaster, Jelle van, author.
Cambridge, MA : Syngress is an imprint of Elsevier, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
364
Print Material
 

Cyber intrusion into U.S. Office of Personnel Management: in brief


Finklea, Kristin M., author.
[Washington, D.C.] : Congressional Research Service, [2018?]- 2018

Rating:

Copies

365
E-Book/E-Doc
 

Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners


Andress, Jason, author.
Waltham, Massachusetts : Syngress, an imprint of Elsevier, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
366
E-Book/E-Doc
 

Cyberdeterrence and cyberwar


Libicki, Martin C.
Santa Monica, CA : RAND, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
367
Print Material
 

Cybersecurity and information sharing


Weiss, N. Eric, author.
[Washington, D.C.] : Congressional Research Service, [2018?]- 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.24:IF 10163/    ---  Available
368
Print Material
 

Cybersecurity and information sharing: comparison of H.R. 1560 (PCNA and NCPAA) and S. 754 (CISA)


Fischer, Eric A., author.
[Washington, D.C.] : Congressional Research Service, [2018?]- 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.23:R44069/    ---  Lib Use Only
369
Print Material
 

Cybersecurity: homeland security issues for the 116th Congress


Jaikaran, Chris, author.
[Washington, D.C.] : Congressional Research Service, 2019- 2019

Rating:

Copies

370
Print Material
 

Cybersecurity : internet architecture is considered resilient, but federal agencies continue to addr


United States. Government Accountability Office, author.
Washington, D.C. : United States Government Accountability Office, 2022. 2022

Rating:

Copies

371
Print Material
 

Cybersecurity issues and challenges


Fischer, Eric A., author.
[Washington, D.C.] : Congressional Research Service, 2019- 2019

Rating:

Copies

372
Print Material
 

Cybersecurity : OMB should update inspector general reporting guidance to increase rating consistenc


United States. Government Accountability Office, author.
Washington, D.C. : United States Government Accountability Office, 2022. 2022

Rating:

Copies

373
E-Book/E-Doc
 

Cybersecurity operations handbook


Rittinghouse, John W.
Amsterdam ; Boston : Elsevier Digital Press, ©2003. 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
374
Print Material
 

Cybersecurity: Secret Service has made progress toward zero trust architecture, but work remains : r


United States. Government Accountability Office, author.
Washington, DC : United States Government Accountability Office, 2022. 2022

Rating:

Copies

375
Print Material
 

The cybersecurity value-at-risk framework : informing cybersecurity decisions


Sanghvi, Anuj, author.
[Golden, Colo.] : National Renewable Energy Laboratory, 2021. 2021

Rating:

Copies

376
Print Material
 

Cybersecurity Vulnerability Identification and Notification Act : report of the Committee on Homelan


United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs, author.
Washington : U.S. Government Publishing Office, 2020. 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/5:116-242    ---  Available
377
Print Material
 

Cybersecurity Vulnerability Remediation Act : report (to accompany H.R. 3710) (including cost estima


United States. Congress. House. Committee on Homeland Security, author.
[Washington, D.C.] : [U.S. Government Publishing Office], [2019] 2019

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/8:116-193    ---  Lib Use Only
378
E-Book/E-Doc
 

A cyberworm that knows no boundaries


Porche, Isaac, 1968-
Santa Monica : RAND Corp., 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
379
E-Book/E-Doc
 

Data breach preparation and response : breaches are certain, impact is not


Fowler, Kevvie, author.
Cambridge, MA : Syngress is an imprint of Elsevier, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
380
E-Book/E-Doc
 

Data networks : routing, security, and performance optimization


Kenyon, Tony, 1960-
Boston : Digital Press, ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
381
E-Book/E-Doc
 

The defender's dilemma : charting a course toward cybersecurity


Libicki, Martin C., author.
Santa Monica, CA : RAND, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
382
Print Material
 

Defense acquisitions : Cyber Command needs to develop metrics to assess warfighting capabilities : r


United States. Government Accountability Office, author.
[Washington, D.C.] : United States Government Accountability Office, 2022. 2022

Rating:

Copies

383
Print Material
 

Department of Defense cybersecurity culture and compliance (DC3I).



Washington, D.C. : Office of the Secretary of Defense, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:C 99/4    ---  Available
384
Print Material
 

The Department's unclassified cyber security program - 2009


United States. Department of Energy. Office of Audit Services, author.
Washington, DC : U.S. Department of Energy, Office of Inspector General, 2009. 2009

Rating:

Copies

385
E-Book/E-Doc
 

Designing and building enterprise DMZs



Rockland, MA : Syngress, ©2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
386
E-Book/E-Doc
 

Developer's guide to web application security


Cross, Michael, 1965-
Rockland, MA : Syngress Pub., ©2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
387
Print Material
 

DHS can better mitigate the risks associated with malware, ransomware, and phishing attacks


United States. Department of Homeland Security. Office of Inspector General, author.
[Washington, D.C.] : U.S. Department of Homeland Security, 2022. 2022

Rating:

Copies

388
Print Material
 

DHS has made limited progress implementing the Continuous Diagnostics and Mitigation Program


United States. Department of Homeland Security. Office of Inspector General, author.
Washington, DC : U.S. Department of Homeland Security, Office of Inspector General, 2021. 2021

Rating:

Copies

389
Print Material
 

DHS needs to improve cybersecurity workforce planning


United States. Department of Homeland Security. Office of Inspector General, author.
Washington, DC : U.S. Department of Homeland Security, Office of Inspector General, 2019. 2019

Rating:

Copies

390
E-Book/E-Doc
 

Digital identity, an emergent legal concept the role and legal nature of digital identity in commerc


Sullivan, Clare.
Adelaide : University of Adelaide Press, ©2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
391
E-Book/E-Doc
 

Digital identity management



London : ISTE Press Ltd ; Oxford : Elsevier Ltd, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
392
E-Book/E-Doc
 

Disappearing cryptography : information hiding : steganography & watermarking


Wayner, Peter, 1964-
Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
393
E-Book/E-Doc
 

Disappearing cryptography : information hiding : steganography & watermarking


Wayner, Peter, 1964-
Amsterdam ; Boston : Morgan Kaufmann Publishers, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
394
E-Book/E-Doc
 

Dissecting the hack : the forb1dd3n network



Amsterdam ; Boston : Syngress, ©2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
395
E-Book/E-Doc
 

Dissecting the hack : the v3rb0ten network


Street, Jayson E., author.
Waltham, MA : Syngress is an imprint of Elsevier, [2015] 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
396
E-Book/E-Doc
 

DNS security : defending the domain name system


Liska, Allan, author.
Cambridge, MA : Syngress is an imprint of Elsevier, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
397
Print Material
 

DOD cybersecurity : enhanced attention needed to ensure cyber incidents are appropriately reported a


United States. Government Accountability Office, author.
Washington, DC : United States Government Accountability Office, 2022. 2022

Rating:

Copies

398
Print Material
 

The DoD cybersecurity policy chart.



[Herndon, VA] : [Information Assurance Technology Analysis Center], [2009-2012] 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 10.17:P 75/    ---  Available
399
E-Book/E-Doc
 

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
400
Print Material
 

The EPA lacks documented procedures for detecting and removing unapproved software on the agency's n


United States. Environmental Protection Agency. Office of the Inspector General, author.
Washington, D.C. : Office of Inspector General, U.S. Environmental Protection Agency, 2022. 2022

Rating:

Copies

Add Marked to Bag Add All On Page
Locate in results
Result Page   
 
    
Available items only