Skip to content
You are not logged in |Login  
     
Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-36 of 36)
Security Computers General
1
Bestseller
BestsellerE-Book
Book Cover

Android application security essentials


Rai, Pragati Ogal.
Birmingham : Packt Publishing, 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
2
Bestseller
BestsellerE-Book
Book Cover

Android security cookbook : practical recipes to delve into Android's security mechanisms by trouble


Makan, Keith, author.
Birmingham, UK : Packt Pub., 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
3
Bestseller
BestsellerE-Book
Book Cover

At the nexus of cybersecurity and public policy : some basic concepts and issues



Washington, D.C. : The National Academies Press, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
4
Bestseller
BestsellerE-Book
Book Cover

Blockchain Development with Hyperledger : Build Decentralized Applications with Hyperledger Fabric a


Baset, Salman A, author.
Birmingham : Packt Publishing Ltd, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
5
Bestseller
BestsellerE-Book
 

Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain,


Rubinoff, Shira, author.
Birmingham, UK : Packt Publishing, 2020. 2020

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
6
Bestseller
BestsellerE-Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
7
Bestseller
BestsellerE-Book
Book Cover

Cyberdeterrence and cyberwar


Libicki, Martin C.
Santa Monica, CA : RAND, 2009. 2009

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
8
Bestseller
BestsellerE-Book
Book Cover

Cybersecurity : public sector threats and responses



Boca Raton, FL : CRC Press, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
9
Bestseller
BestsellerE-Book
Book Cover

CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in


Mehan, Julie E.
Ely, Cambridge, UK : IT Governance Pub., 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
10
Bestseller
BestsellerE-Book
Book Cover

A cyberworm that knows no boundaries


Porche, Isaac, 1968-
Santa Monica : RAND Corporation, 2011. 2011

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
11
Bestseller
BestsellerE-Book
Book Cover

Data privacy for the smart grid


Herold, Rebecca.
Boca Raton : Taylor & Francis, CRC Press, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
12
Bestseller
BestsellerE-Book
Book Cover

Data privacy in the information age


Klosek, Jacqueline, 1972-
Westport, Conn. : Quorum Books, [2000] 2000

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
13
Bestseller
BestsellerE-Book
Book Cover

Defense against the black arts : how hackers do what they do and how to protect against it


Varsalone, Jesse.
Boca Raton, FL : CRC Press, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
14
Bestseller
BestsellerE-Book
Book Cover

Exploring encryption and potential mechanisms for authorized government access to plaintext : procee


Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext (2016 : Washington, D.C.), author.
Washington, DC : The National Academies Press, [2016] 2016

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
15
Bestseller
BestsellerE-Book
Book Cover

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
16
Bestseller
BestsellerE-Book
Book Cover

Information security governance simplified : from the boardroom to the keyboard


Fitzgerald, Todd.
Boca Raton : CRC Press, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
17
Bestseller
BestsellerE-Book
Book Cover

Internet censorship : protecting citizens or trampling freedom?


Zuchora-Walske, Christine.
Minneapolis : Twenty-First Century Books, 2010. 2010

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
18
Bestseller
BestsellerE-Book
Book Cover

Managing information security



Waltham, MA : Syngress, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
19
Bestseller
BestsellerE-Book
Book Cover

Managing risk and information security : protect to enable


Harkins, Malcolm, author.
[Berkeley, California] : Apress Open, [2016] 2016

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
20
Bestseller
BestsellerE-Book
Book Cover

Mastering Microsoft Forefront UAG 2010 customization : discover the secrets to extending and customi


Ben-Ari, Erez.
Birmingham, UK : Packt Publishing, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
21
Bestseller
BestsellerE-Book
Book Cover

Microsoft 365 Mobility and Security. Explore Threat Management, Governance, Security, Compliance, an


Chamberlain, Nate, author.
Birmingham : Packt Publishing, Limited, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
22
Bestseller
BestsellerE-Book
Book Cover

Mobile Security : How to secure, privatize and recover your devices


Speed, Tim.
Birmingham : Packt Publishing, 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
23
Bestseller
BestsellerE-Book
Book Cover

ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application h


Mischel, Magnus.
Birmingham, U.K. : Packt Pub., [2009] 2009

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
24
Bestseller
BestsellerE-Book
Book Cover

Network and system security



Amsterdam ; Boston : Syngress, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
25
Bestseller
BestsellerE-Book
Book Cover

Nine steps to success : an ISO 27001:2013 implementation overview


Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
26
Bestseller
BestsellerE-Book
Book Cover

Principles of security and trust : 7th International Conference, POST 2018, held as part of the Euro


POST (Conference) (7th : 2018 : Thessalonikē, Greece)
Cham, Switzerland : Springer Open, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
27
Bestseller
BestsellerE-Book
Book Cover

The psychology of information security : resolving conflicts between security compliance and human b


Zinatullin, Leron, author.
Ely, Cambridgeshire : IT Governance Publishing, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
28
Bestseller
BestsellerE-Book
Book Cover

Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configur


Parisi, Alessandro, author.
Birmingham, UK : Packt Publishing, 2020. 2020

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
29
Bestseller
BestsellerE-Book
Book Cover

Security in computer and information sciences : first International ISCIS Security Workshop 2018, Eu


Euro-CYBERSEC (Workshop) (1st : 2018 : London, England)
Cham, Switzerland : Springer Open, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
30
Bestseller
BestsellerE-Book
Book Cover

Security in distributed, grid, mobile, and pervasive computing


Xiao, Yang, 1966-
Boca Raton : Auerbach Publications, [2007] 2007

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
31
Bestseller
BestsellerE-Book
Book Cover

Security of networks and services in an all-connected world : 11th IFIP WG 6.6 International Confere


IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management and Security (11th : 2017 : Zurich, Switzerland)
Cham : Springer, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
32
Bestseller
BestsellerE-Book
Book Cover

Security+® Practice Tests : Prepare for, Practice, and Pass the CompTIA Security+ Exam


Chapple, Mike, author
Birmingham : Packt Publishing, Limited, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
33
Bestseller
BestsellerE-Book
Book Cover

Symbiotic interaction : 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29-30, 2


Symbiotic (Workshop) (5th : 2016 : Padua, Italy)
Cham, Switzerland : Springer, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
34
Bestseller
BestsellerE-Book
Book Cover

The true cost of information security breaches and cyber crime


Krausz, Michael.
Ely, Cambridgeshire, U.K. : IT Governance Pub., 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
Security Computers Internet
35
Bestseller
BestsellerE-Book
Book Cover

Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing


Hemenway, Brett, 1981-
Santa Monica, Calif. : Rand Corporation, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
36
Bestseller
BestsellerE-Book
Book Cover

At the nexus of cybersecurity and public policy : some basic concepts and issues



Washington, D.C. : The National Academies Press, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
Add Marked to Bag Add All On Page
Locate in results