Your search returned 61 results. Subscribe to this search

|
1. Principles of information security / Michael E. Whitman, Herbert J. Mattford.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Seventh edition.Boston, MA, USA : Cengage Learning, 2022Availability: Items available for loan: College Library [Call number: GC 005.8 W59 2022] (1).
2. Enterprise cybersecurity in digital business : building a cyber resilient organization / Ariel Evans, author.

by Evans, Ariel [author.].

Abingdon, Oxon, UK : Routledge, 2022Availability: Items available for loan: College Library [Call number: GC 005.8 Ev15 2022] (1).
3. CISM certified information security manager study guide / Mike Chapple.

by Chapple, Mike [author.].

Publisher: Hoboken, New Jersey, USA : John Wiley & Sons, Inc., 2022Availability: Items available for loan: College Library [Call number: GC 005.8 C36 2022] (1).
4. E-commerce security management strategy in banking / Dr. A. Sajeevan Rao.

by Rao, A. Sajeevan.

New Delhi, India : Random Publications, 2022Availability: Items available for loan: College Library [Call number: GC 658.872 R18 2022] (1).
5. Assessing and insuring cybersecurity risk / Ravi Das.

by Das, Ravindra [author.].

Publisher: Boca Raton, Florida, USA : CRC Press, Taylor and Francis, 2022Availability: Items available for loan: College Library [Call number: GC 005.8 D26 2022] (1).
6. Managing risk in information systems / Darril Gibson, Andy Igonor.

by Gibson, Darril [author.] | Igonor, Andy [author.].

Edition: Third edition.Publisher: Burlington, MA : Jones & Bartlett Learning, 2022Availability: Items available for loan: College Library [Call number: GC 005.8 G35 2022] (1).
7. Network security, firewalls, and VPNs / J. Michael Stewart, Denise Kinsey.

by Stewart, James Michael [author.] | Kinsey, Denise [author.].

Edition: Third edition.Publisher: Burlington, MA : Jones & Bartlett Learning, 2021Availability: Items available for loan: College Library [Call number: GC 005.8 St49 2021] (1).
8. Information assurance and security 1 & 2 / Dr. Marmelo Abante, author; co-authors: Dr. Rolando Lansigan, Prof. Alvin Dale Joyosa, Prof. Wilfredo Tomas Jr., Dr. Mary Joy Delos Trinos, Prof. Rejan Tadeo, Prof. Alain Anuevo, Prof. Jerald Gongora, Prof. Alice Lacorte

by Abante, Marmelo [author.] | Lansigan, Rolando [author.] | Joyosa, Alvin Dale [author.] | Tomas, Wilfredo [author.] | Delos Trinos, Mary Joy [author.] | Tadeo, Rejan [author.] | Anuevo, Alain [author.] | Gongora, Jerald [author.] | Lacorte, Alice [author.].

Manila, Philippines : Mindshapers Co., Inc., 2022Availability: Items available for loan: College Library [Call number: Fil 005.8 In34] (2). Checked out (1).
9. Cyber security / Markus Mack.

by Mack, Markus.

Waltham Abbey, United Kingdom : Ed Tech Press, ©2018Availability: Items available for loan: College Library [Call number: GC 005.8 M19 2018] (1).
10. Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: Seventh edition, global editionHarlow, Essex, England : Pearson Education Limited, ©2017Availability: Items available for loan: College Library [Call number: GC 005.8 St18 2017] (1).
11. Hacking for dummies / Kevin Beaver.

by Beaver, Kevin.

Edition: 6th editionPublisher: Hoboken, NJ : John Wiley & Sons, Inc, ©2018Availability: Items available for loan: College Library [Call number: GC 005.8 B38 2018] (1).
12. Advanced penetration testing : hacking the world's most secure networks / Wil Allsopp.

by Allsopp, Wil [author.].

Publisher: Indianapolis, IN : John Wiley & Sons, Inc., ©2017Availability: Items available for loan: College Library [Call number: GC 005.8 Al58 2017] (1).
13. Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- [author.] | Mattford, Herbert J [author.].

Edition: Sixth edition.Publisher: Boston, Massachusetts, USA : Cengage Learning, ©2019Copyright date: ©2019Availability: Items available for loan: College Library [Call number: GC 658.478 W59 2019] (1).
14. Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart.

by Nelson, Bill [author.] | Phillips, Amelia [author.] | Steuart, Christopher [author.].

Edition: Sixth edition.Publisher: Boston, Massachusetts, USA : Cengage, [2019]Copyright date: ©2019Availability: Items available for loan: College Library [Call number: GC 005.8 N33 2019] (1).
15. Hacker techniques, tools, and incident handling / Sean-Philip Oriyano, Michael G. Solomon.

by Oriyano, Sean-Philip [author.] | Solomon, Michael (Michael G.), 1963- [author.].

Edition: Third edition.Publisher: Burlington, MA : Jones & Bartlett Learning, ©2020Availability: Items available for loan: College Library [Call number: GC 005.8 Or49 2020] (1).
16. Malware data science : attack detection and attribution / Joshua Saxe, Hillary Sanders.

by Saxe, Joshua | Sanders, Hillary.

Publisher: San Francisco, California, USA : No Starch Press, ©2018Availability: Items available for loan: College Library [Call number: GC 005.84 Sa97 2018] (1).
17. CompTIA security+ SYO-401 in depth / Mark Ciampa, Ph.D.

by Ciampa, Mark D [author.].

Publisher: Boston, Massachusetts, USA : Cengage Learning, ©2015Availability: Items available for loan: College Library [Call number: GC 005.8 C48 2015] (1).
18. Cloud computing security : foundations and challenges / editor, John R. Vacca.

by Vacca, John R, 1947- [editor.].

Boca Raton, Florida, USA : CRC Press, ©2017Availability: Items available for loan: College Library [Call number: COECS/C 005.8/C62] (1).
19. Hands-on ethical hacking and network defense / Michael T. Simpson and Nicholas D. Antill.

by Simpson, Michael T, 1954- | Antill, Nicholas D.

Edition: Third edition.Boston, Massachusetts, USA : Cengage Learning, ©2017Availability: Items available for loan: College Library [Call number: COECS/C 005.8/Si58] (1).
20. Thinking security : stopping next year's hackers / Steven M. Bellovin.

by Bellovin, Steven M [author.].

New York, NY, USA : Addison-Wesley, ©2016Availability: Items available for loan: College Library [Call number: COECS/E 658.478/B41] (1).
21. Security strategies in Linux platforms and applications / Michael Jang and Ric Messier.

by Jang, Michael H | Messier, Ric.

Edition: Second edition.Burlington, MA, USA : Jones & Bartlett Learning, ©2017Availability: Items available for loan: College Library [Call number: COECS/E 005.8/J25] (1).
22. Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: Sixth edition.Publisher: New Delhi, India : Pearson Education, Inc., Dorling Kindersley (India) Pvt. Ltd., ©2014Availability: Items available for loan: College Library [Call number: CCS 005.8/St18] (1).
23. The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress, Steven Winterfeld, technical editor.

by Andress, Jason.

Edition: Second edition.Amsterdam, The Netherlands , Boston, MA : Elsevier/Syngress, Syngress is a imprint of Elsevier, ©2014Availability: Items available for loan: College Library [Call number: CCS 005.8/An25] (1).
24. Principles of information security / Michael E. Whitman, Herbert J. Mattford.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Fifth edition.Boston, MA : Cengage Learning, ©2016Availability: Items available for loan: College Library [Call number: CCS 005.8/W59] (1).
25. Cybersecurity : engineering a secure information technology organization / Dan Shoemaker, Ph. D., Center for Cyber Security and Intelligence Studies (CCIS), University of Detroit Mercy, Director of Global EdlCT, Kenneth Sigler, M.S., MS Computer Information Systems - Software Management, Computer Information Systems Faculty and Department Chair, Oakland Community College, Auburn Hills, Michigan.

by Shoemaker, Dan [author.] | Sigler, Kenneth [author.].

Stamford, CT : Cengage Learning, ©2015Availability: Items available for loan: College Library [Call number: GC 005.8 Sh73 2015] (1).
26. Laboratory manual to accompany auditing IT infrastructures for compliance.

Burlington, Massachusetts : Jones & Bartlett Learning, ©2014Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
27. Laboratory manual to accompany auditing IT infrastructures for compliance.

Edition: 1E Revised.Burlington, Massachusetts : Jones & Bartlett Learning, ©2013Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
28. Laboratory manual to accompany fundamentals of information systems security.

Burlington, MA : Jones & Bartlett Learning, ©2013Availability: Items available for loan: College Library [Call number: GC 005.8CL11] (1).
29. Laboratory manual to accompany security strategies in Windows platforms and applications.

Burlington, MA : Jones & Bartlett Learning, ©2013Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
30. Laboratory manual to accompany security strategies in Windows platforms and applications.

Burlington, MA : Jones & Bartlett Learning, ©2014Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
31. Laboratory manual to accompany access control, authentication, and public key infrasturcture.

Edition: 1E revised.Burlington, MA : Jones & Bartlett Learning, ©2013Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
32. Terminal Compromise [electronic resource] / Winn Schwartau

by Schwartau, Winn.

Publisher: Project Gutenberg, 1993Online access: Click here to access online Availability: Items available for loan: Project Gutenburg (1).
33. Underground : Hacking, madness and obsession on the electronic frontier [electronic resource] / Suelette Dreyfus

by Dreyfus, Suelette | Assange, Julian, 1971-.

Publisher: Project Gutenberg, 2003Online access: Click here to access online Availability: Items available for loan: Project Gutenburg (1).
34. Laboratory manual to accompany security strategies in windows platforms and applications /

Edition: 1st ed.Burlington, Massachusetts : Jones & Bartlett Learning, ©2013Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
35. Laboratory manual to accompany network security, firewalls, and VPNs.

Edition: 1st ed.Burlington, MA : Jones & Bartlett Learning, ©2013Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
36. Laboratory manual to accompany Fundamentals of information systems security /

Burlington, MA : Jones & Bartlett Learning, ©2014Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
37. Laboratory Manual Version 1.5 To Accompany Managing Risk In Information Systems /

Burlington, Mass. : Jones & Bartlett Learning, ©2014Availability: Items available for loan: College Library [Call number: GC 005.8 L11 2014] (1).
38. Laboratory manual version 1.5 to accompany network security, firewalls, and VPNs /

Burlington, MA : Jones & Bartlett Learning, ©2013Availability: Items available for loan: College Library [Call number: GC 005.8 L11] (1).
39. Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 4th ed.Boston, MA : Course Technology, ©2012Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: College Library [Call number: CCS 005.8/W59] (1).
40. Reliability and availability of cloud computing / Eric Bauer, Randee Adams.

by Bauer, Eric | Adams, Randee.

Piscataway, NJ : Hoboken, NJ : IEEE Press ; Wiley, ©2012Availability: Items available for loan: College Library [Call number: CCS 004.6782/B32] (1).
41. Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 4th ed.Boston, MA : Course Technology, ©2012Online access: Contributor biographical information | Publisher description | Table of contents only Availability: No items available
42. Laboratory manual to accompany Fundamentals of information systems security /

Burlington, MA : Jones & Bartlett Learning, ©2014Availability: No items available
43. Laboratory Manual Version 1.5 To Accompany Managing Risk In Information Systems /

Burlington, Mass. : Jones & Bartlett Learning, ©2014Availability: No items available
44. Laboratory manual version 1.5 to accompany network security, firewalls, and VPNs /

Burlington, MA : Jones & Bartlett Learning, ©2013Availability: No items available
45. Laboratory manual to accompany security strategies in windows platforms and applications /

Edition: 1st ed.Burlington, Massachusetts : Jones & Bartlett Learning, ©2013Availability: No items available
46. Laboratory manual to accompany network security, firewalls, and VPNs.

Edition: 1st ed.Burlington, MA : Jones & Bartlett Learning, ©2013Availability: No items available
47. Reliability and availability of cloud computing / Eric Bauer, Randee Adams.

by Bauer, Eric | Adams, Randee.

Piscataway, NJ : Hoboken, NJ : IEEE Press ; Wiley, ©2012Availability: No items available
48. Laboratory manual to accompany auditing IT infrastructures for compliance.

Burlington, Massachusetts : Jones & Bartlett Learning, ©2014Availability: No items available
49. Laboratory manual to accompany auditing IT infrastructures for compliance.

Edition: 1E Revised.Burlington, Massachusetts : Jones & Bartlett Learning, ©2013Availability: No items available
50. Laboratory manual to accompany fundamentals of information systems security.

Burlington, MA : Jones & Bartlett Learning, ©2013Availability: No items available