Skip to content
You are not logged in |Login  
     
Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-45 of 45)
Computers Security General
1
Bestseller
BestsellerE-Book
Book Cover

Android application security essentials


Rai, Pragati Ogal.
Birmingham : Packt Publishing, 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
2
Bestseller
BestsellerE-Book
Book Cover

Android security cookbook : practical recipes to delve into Android's security mechanisms by trouble


Makan, Keith, author.
Birmingham, UK : Packt Pub., 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
3
Bestseller
BestsellerE-Book
Book Cover

Assessing information security : strategies, tactics, logic and framework


Vladimirov, Andrew A., author.
Ely, Cambridgeshire : IT Governance Publishing, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
4
Bestseller
BestsellerE-Book
Book Cover

At the nexus of cybersecurity and public policy : some basic concepts and issues



Washington, D.C. : The National Academies Press, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
5
Bestseller
BestsellerE-Book
Book Cover

Blockchain Development with Hyperledger : Build Decentralized Applications with Hyperledger Fabric a


Baset, Salman A, author.
Birmingham : Packt Publishing Ltd, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
6
book
BookBook
Book Cover

Breaking and entering : the extraordinary story of a hacker called "Alien"


Smith, Jeremy N., author.
Boston : Houghton Mifflin Harcourt, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Avon Free Public Library - Adult Department  COMPUTER 005.8 SMITH    Check Shelf
 Cromwell-Belden Public Library - Adult Department  005.8 SMI    Check Shelf
 East Hartford, Raymond Library - Adult Department  005.8 SMITH    Check Shelf
There are additional copies/volumes of this item
7
book
BookBook
Book Cover

Countdown to Zero Day : Stuxnet and the launch of the world's first digital weapon


Zetter, Kim, author.
New York : Crown Publishers, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Berlin-Peck Memorial Library - Non Fiction  355.4 ZETTER    Check Shelf
 Bristol, Main Library - Non Fiction  355.4 ZETTER    Check Shelf
 Enfield, Main Library - Adult Department  355.4 ZET    Check Shelf
There are additional copies/volumes of this item
8
Bestseller
BestsellerE-Book
Book Cover

The Cyber Attack Survival Manual : Tools for Surviving Everything from Identity Theft to the Digital


Selby, Nick, author.
[Place of publication not identified] : Weldon Owen, [2017] 2017

Rating:

 

Copies

Location Call No. Status
 Farmington - Downloadable Materials  Freading Ebook    Downloadable
Farmington cardholders click here to access this title from Freading
 Newington - Downloadable Materials  Freading E-Book    Downloadable
Newington cardholders click here to access this title from Freading
 Rocky Hill - Downloadable Materials  Freading Ebook    Downloadable
Rocky Hill cardholders click here to access this title from Freading
There are additional copies/volumes of this item
9
Bestseller
BestsellerE-Book
 

Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain,


Rubinoff, Shira, author.
Birmingham, UK : Packt Publishing, 2020. 2020

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
10
Bestseller
BestsellerE-Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
11
Bestseller
BestsellerE-Book
Book Cover

Cyberdeterrence and cyberwar


Libicki, Martin C.
Santa Monica, CA : RAND, 2009. 2009

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
12
Bestseller
BestsellerE-Book
Book Cover

Cybersecurity : public sector threats and responses



Boca Raton, FL : CRC Press, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
13
Bestseller
BestsellerE-Book
Book Cover

CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in


Mehan, Julie E.
Ely, Cambridge, UK : IT Governance Pub., 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
14
Bestseller
BestsellerE-Book
Book Cover

A cyberworm that knows no boundaries


Porche, Isaac, 1968-
Santa Monica : RAND Corporation, 2011. 2011

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
15
Bestseller
BestsellerE-Book
Book Cover

Data privacy for the smart grid


Herold, Rebecca.
Boca Raton : Taylor & Francis, CRC Press, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
16
Bestseller
BestsellerE-Book
Book Cover

Data privacy in the information age


Klosek, Jacqueline, 1972-
Westport, Conn. : Quorum Books, [2000] 2000

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
17
Bestseller
BestsellerE-Book
Book Cover

Defense against the black arts : how hackers do what they do and how to protect against it


Varsalone, Jesse.
Boca Raton, FL : CRC Press, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
18
Bestseller
BestsellerE-Book
Book Cover

Exploring encryption and potential mechanisms for authorized government access to plaintext : procee


Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext (2016 : Washington, D.C.), author.
Washington, DC : The National Academies Press, [2016] 2016

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
19
Bestseller
BestsellerE-Book
Book Cover

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
20
book
BookBook
Book Cover

The future of violence : robots and germs, hackers and drones : confronting a new age of threat


Wittes, Benjamin.
New York : Basic Books, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 South Windsor Public Library - Non Fiction  303.601 WITTES    Check Shelf
21
Book on CD
Book on CDAudiobook on CD/MP3
Book Cover

A hacker's mind : how the powerful bend society's rules, and how to bend them back


Schneier, Bruce, 1963- author.
[Prince Frederick, Maryland] : Recorded Books, Inc., [2023] 2023

Rating:

 

Copies

Location Call No. Status
 Glastonbury, Welles-Turner Memorial Library - Adult Department  CDBK 364.168 SCHNEIER    Check Shelf
22
Bestseller
BestsellerE-Book
Book Cover

Information security governance simplified : from the boardroom to the keyboard


Fitzgerald, Todd.
Boca Raton : CRC Press, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
23
Bestseller
BestsellerE-Book
Book Cover

Internet censorship : protecting citizens or trampling freedom?


Zuchora-Walske, Christine.
Minneapolis : Twenty-First Century Books, 2010. 2010

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
24
Bestseller
BestsellerE-Book
Book Cover

Learn social engineering : learn the art of human hacking with an internationally renowned expert


Ozkaya, Erdal, author.
Birmingham, UK : Packt Publishing, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
25
Bestseller
BestsellerE-Book
Book Cover

Managing information security



Waltham, MA : Syngress, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
26
Bestseller
BestsellerE-Book
Book Cover

Managing risk and information security : protect to enable


Harkins, Malcolm, author.
[Berkeley, California] : Apress Open, [2016] 2016

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
27
Bestseller
BestsellerE-Book
Book Cover

Mastering Microsoft Forefront UAG 2010 customization : discover the secrets to extending and customi


Ben-Ari, Erez.
Birmingham, UK : Packt Publishing, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
28
Bestseller
BestsellerE-Book
Book Cover

Microsoft 365 Mobility and Security. Explore Threat Management, Governance, Security, Compliance, an


Chamberlain, Nate, author.
Birmingham : Packt Publishing, Limited, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
29
Bestseller
BestsellerE-Book
Book Cover

Mobile Security : How to secure, privatize and recover your devices


Speed, Tim.
Birmingham : Packt Publishing, 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
30
Bestseller
BestsellerE-Book
Book Cover

ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application h


Mischel, Magnus.
Birmingham, U.K. : Packt Pub., [2009] 2009

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
31
Bestseller
BestsellerE-Book
Book Cover

Network and system security



Amsterdam ; Boston : Syngress, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
32
Bestseller
BestsellerE-Book
Book Cover

Nine steps to success : an ISO 27001:2013 implementation overview


Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
33
Bestseller
BestsellerE-Book
Book Cover

Practical internet of things security : a practical, indispensable security guide that will navigate


Russell, Brian, author.
Birmingham, UK : Packt Publishing, [2016]. 2016

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
34
Bestseller
BestsellerE-Book
Book Cover

Principles of security and trust : 7th International Conference, POST 2018, held as part of the Euro


POST (Conference) (7th : 2018 : Thessalonikē, Greece)
Cham, Switzerland : Springer Open, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
35
Bestseller
BestsellerE-Book
Book Cover

The psychology of information security : resolving conflicts between security compliance and human b


Zinatullin, Leron, author.
Ely, Cambridgeshire : IT Governance Publishing, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
36
Bestseller
BestsellerE-Book
Book Cover

Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configur


Parisi, Alessandro, author.
Birmingham, UK : Packt Publishing, 2020. 2020

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
37
Bestseller
BestsellerE-Book
Book Cover

Security in computer and information sciences : first International ISCIS Security Workshop 2018, Eu


Euro-CYBERSEC (Workshop) (1st : 2018 : London, England)
Cham, Switzerland : Springer Open, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
38
Bestseller
BestsellerE-Book
Book Cover

Security in distributed, grid, mobile, and pervasive computing


Xiao, Yang, 1966-
Boca Raton : Auerbach Publications, [2007] 2007

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
39
Bestseller
BestsellerE-Book
Book Cover

Security of networks and services in an all-connected world : 11th IFIP WG 6.6 International Confere


IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management and Security (11th : 2017 : Zurich, Switzerland)
Cham : Springer, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
40
Bestseller
BestsellerE-Book
Book Cover

Security+® Practice Tests : Prepare for, Practice, and Pass the CompTIA Security+ Exam


Chapple, Mike, author
Birmingham : Packt Publishing, Limited, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
41
Bestseller
BestsellerE-Book
Book Cover

Symbiotic interaction : 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29-30, 2


Symbiotic (Workshop) (5th : 2016 : Padua, Italy)
Cham, Switzerland : Springer, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
42
Bestseller
BestsellerE-Book
Book Cover

The true cost of information security breaches and cyber crime


Krausz, Michael.
Ely, Cambridgeshire, U.K. : IT Governance Pub., 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
43
Bestseller
BestsellerE-Book
Book Cover

Wireless Hacking 101


Astudillo, Karina, author.
[Place of publication not identified] : Babelcube Inc., [2017] 2017

Rating:

 

Copies

Location Call No. Status
 Avon - Downloadable Materials  Hoopla E-book    Downloadable
Avon cardholders click here to access this title from Hoopla.
 Berlin - Downloadable Materials  Hoopla E-book    Downloadable
Berlin cardholders click here to access this title from Hoopla.
 Bloomfield - Downloadable Materials  Hoopla E-book    Downloadable
Bloomfield cardholders click here to access this title from Hoopla.
There are additional copies/volumes of this item
Computers Security Network Security
44
book
BookBook
Book Cover

Cybersecurity and information security analysts : a practical career guide


Endsley, Kezia, 1968- author.
Lanham : Rowman & Littlefield, [2021] 2021

Rating:

 

Copies

Location Call No. Status
 East Hartford, Raymond Library - Young Adult  YA CC 005.8 ENDSLEY    Check Shelf
Computers Security Networking
45
Bestseller
BestsellerE-Book
Book Cover

Becoming the hacker : the playbook for getting inside the mind of an attacker


Pruteanu, Adrian, author.
Birmingham : Packt Publishing Ltd, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
Add Marked to Bag Add All On Page
Locate in results