Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Result Page   
Add Marked to Bag Add All On Page
Alternate Subjects (101-150 of 150)
Computer Networks Security Measures
101
Print Material
 

Cybersecurity Vulnerability Remediation Act : report (to accompany H.R. 3710) (including cost estima


United States. Congress. House. Committee on Homeland Security, author.
[Washington, D.C.] : [U.S. Government Publishing Office], [2019] 2019

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/8:116-193    ---  Lib Use Only
102
Electronic Book
 

A cyberworm that knows no boundaries


Porche, Isaac, 1968-
Santa Monica : RAND Corp., 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
103
Electronic Book
 

Data breach preparation and response : breaches are certain, impact is not


Fowler, Kevvie, author.
Cambridge, MA : Syngress is an imprint of Elsevier, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
104
Electronic Book
 

Data networks : routing, security, and performance optimization


Kenyon, Tony, 1960-
Boston : Digital Press, ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
105
Electronic Book
 

The defender's dilemma : charting a course toward cybersecurity


Libicki, Martin C., author.
Santa Monica, CA : RAND, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
106
Print Material
 

Department of Defense cybersecurity culture and compliance (DC3I).



Washington, D.C. : Office of the Secretary of Defense, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:C 99/4    ---  Available
107
Electronic Book
 

The Department's unclassified cyber security program - 2009


United States. Department of Energy. Office of Audit Services, author.
Washington, DC : U.S. Department of Energy, Office of Inspector General, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
108
Electronic Book
 

Designing and building enterprise DMZs



Rockland, MA : Syngress, ©2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
109
Electronic Book
 

Developer's guide to web application security


Cross, Michael, 1965-
Rockland, MA : Syngress Pub., ©2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
110
Electronic Book
 

DHS can better mitigate the risks associated with malware, ransomware, and phishing attacks


United States. Department of Homeland Security. Office of Inspector General, author.
[Washington, D.C.] : U.S. Department of Homeland Security, 2022. 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HS 1.22:22-62    ---  Available
111
Electronic Book
 

DHS needs to improve cybersecurity workforce planning


United States. Department of Homeland Security. Office of Inspector General, author.
Washington, DC : U.S. Department of Homeland Security, Office of Inspector General, 2019. 2019

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HS 1.22:19-62    ---  Available
112
Electronic Book
 

Digital identity, an emergent legal concept the role and legal nature of digital identity in commerc


Sullivan, Clare.
Adelaide : University of Adelaide Press, ©2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
113
Electronic Book
 

Digital identity management



London : ISTE Press Ltd ; Oxford : Elsevier Ltd, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
114
Electronic Book
 

Disappearing cryptography : information hiding : steganography & watermarking


Wayner, Peter, 1964-
Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
115
Electronic Book
 

Disappearing cryptography : information hiding : steganography & watermarking


Wayner, Peter, 1964-
Amsterdam ; Boston : Morgan Kaufmann Publishers, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
116
Electronic Book
 

Dissecting the hack : the forb1dd3n network



Amsterdam ; Boston : Syngress, ©2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
117
Electronic Book
 

Dissecting the hack : the v3rb0ten network


Street, Jayson E., author.
Waltham, MA : Syngress is an imprint of Elsevier, [2015] 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
118
Electronic Book
 

DNS security : defending the domain name system


Liska, Allan, author.
Cambridge, MA : Syngress is an imprint of Elsevier, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
119
Print Material
 

The DoD cybersecurity policy chart.



[Herndon, VA] : [Information Assurance Technology Analysis Center], [2009-2012] 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 10.17:P 75/    ---  Available
120
Electronic Book
 

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
121
Electronic Book
 

The EPA lacks documented procedures for detecting and removing unapproved software on the agency's n


United States. Environmental Protection Agency. Office of the Inspector General, author.
Washington, D.C. : Office of Inspector General, U.S. Environmental Protection Agency, 2022. 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  EP 12.15:22-E-0028    ---  Available
122
Print Material
 

EPA's emergency response systems at risk of having inadequate security controls


United States. Environmental Protection Agency. Office of the Inspector General, author.
[Washington, D.C.] : Office of Inspector General, U.S. Environmental Protection Agency, 2021. 2021

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  EP 12.15:21-E-0266    ---  Available
123
Electronic Book
 

Essential skills for hackers


Cardwell, Kevin, author.
Waltham, MA : Syngress is an imprint of Elsevier, [2015] 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
124
Electronic Book
 

Ethereal : packet sniffing


Orebaugh, Angela.
Rockland, MA : Syngress Pub., ©2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
125
Print Material
 

Evaluation of DHS’ information security program for fiscal year 2020.


United States. Department of Homeland Security. Office of Inspector General, author.
Washington, DC : U.S. Department of Homeland Security, Office of Inspector General, 2021. 2021

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HS 1.22:21-72    ---  Available
126
Print Material
 

Evaluation of DHS' compliance with Federal Information Security Modernization Act requirements for i


United States. Department of Homeland Security. Office of Inspector General, author.
[Washington, D.C.] : Department of Homeland Security, 2021. 2021

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 10.2:C 76/18    ---  Available
127
Electronic Book
 

The Federal Energy Regulatory Commission's unclassified cyber security program - 2009


United States. Department of Energy. Office of Audit Services, author.
Washington, DC : U.S. Department of Energy, Office of Inspector General, Office of Audit Services, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
128
Print Material
 

Film it! : YouTube projects for the real world


Bernhardt, Carolyn.
Minneapolis, Minn. : Checkerboard Library, an imprint of Abdo Pub., [2017] 2017

Rating:

 

Copies

Location Call No. OPAC Message Status
 Lakeside Non-Fiction  006.7 BER    ---  Available
129
Electronic Book
 

Firewall policies and VPN configurations



Rockland, MA : Syngress, ©2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
130
Electronic Book
 

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
131
Electronic Book
 

GFI network security and PCI compliance power tools


Posey, Brien.
Burlington, MA : Syngress Pub, ©2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
132
Electronic Book
 

Google hacking for penetration testers


Long, Johnny, author.
Waltham, MA : Elsevier Ltd., [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
133
Electronic Book
 

Google hacking for penetration testers.


Long, Johnny.
Burlington, MA : Syngress Pub., ©2008. 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
134
Electronic Book
 

Hack proofing ColdFusion



Rockland, MA : Syngress, ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
135
Electronic Book
 

Hack proofing Sun Solaris 8


Miles, Wyman.
Rockland, MA : Syngress Pub. : Distributed by Publishers Group West, ©2001. 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
136
Electronic Book
 

Hack proofing Windows 2000


Todd, Chad.
Rockland, MA : Syngress, ©2001. 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
137
Electronic Book
 

Hack proofing your network



Rockland, MA : Syngress, ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
138
Electronic Book
 

Hack proofing your Web applications



Rockland, Mass. : Syngress Pub., ©2001. 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
139
Electronic Book
 

Hack proofing your wireless network


Barnes, Christian.
Rockland, MA : Syngress Pub., ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
140
Electronic Book
 

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
141
Electronic Book
 

Hacking a terror network : the silent threat of covert channels


Rogers, Russ.
Rockland, Mass. : Syngress Pub., ©2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
142
Electronic Book
 

Hacking the code : ASP.NET web application security


Burnett, Mark (Mark M.)
Rockland, MA : Syngress Pub., ©2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
143
Electronic Book
 

Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques


Chauhan, Sudhanshu, author.
Waltham, MA : Syngress, an imprint of Elsevier, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
144
Electronic Book
 

Hacking with Kali : practical penetration testing techniques


Broad, James.
Amsterdam ; Boston : Syngress, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
145
Electronic Book
 

Handbook of system safety and security : cyber risk and risk management, cyber security, threat anal



Cambridge, MA : Syngress is an imprint of Elsevier, [2017] 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
146
Electronic Book
 

Handbook on securing cyber-physical critical infrastructure



Waltham, MA : Morgan Kaufmann, ©2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
147
Electronic Book
 

Host integrity monitoring : using Osiris and Samhain


Wotring, Brian.
Rockland, Mass. : Syngress Pub., ©2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
148
Electronic Book
 

How to cheat at configuring ISA server 2004


Shinder, Thomas W.
Rockland, Mass. : Syngress, ©2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
149
Electronic Book
 

How to cheat at configuring Open Source security tools



Rockland, Mass. : Syngress, ©2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
150
Electronic Book
 

How to cheat at designing security for a Windows Server 2003 network



Rockland, Mass. : Syngress Pub., ©2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
Result Page   
 
    
Available items only