Skip to content
You are not logged in |Login  
     
Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-29 of 29)
Security Computers Internet
1
Bestseller
BestsellerE-Book
Book Cover

Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing


Hemenway, Brett, 1981-
Santa Monica, Calif. : Rand Corporation, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
2
Bestseller
BestsellerE-Book
Book Cover

At the nexus of cybersecurity and public policy : some basic concepts and issues



Washington, D.C. : The National Academies Press, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
3
Bestseller
BestsellerE-Book
Book Cover

The Cloud : understanding the security, privacy and trust challenges


Robinson, Neil, 1964-
Santa Monica : Rand, 2011. 2011

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
4
Bestseller
BestsellerE-Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
5
Bestseller
BestsellerE-Book
Book Cover

A cyberworm that knows no boundaries


Porche, Isaac, 1968-
Santa Monica : RAND Corporation, 2011. 2011

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
6
Bestseller
BestsellerE-Book
Book Cover

Data privacy in the information age


Klosek, Jacqueline, 1972-
Westport, Conn. : Quorum Books, [2000] 2000

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
7
Bestseller
BestsellerE-Book
Book Cover

The defender's dilemma : charting a course toward cybersecurity


Libicki, Martin C., author.
Santa Monica, Calif. : RAND, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
8
Bestseller
BestsellerE-Book
Book Cover

Defense against the black arts : how hackers do what they do and how to protect against it


Varsalone, Jesse.
Boca Raton, FL : CRC Press, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
9
Bestseller
BestsellerE-Book
Book Cover

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
10
Bestseller
BestsellerE-Book
Book Cover

How do we know what information sharing is really worth? : exploring methodologies to measure the va


Jackson, Brian A., 1972- author.
Santa Monica, CA : RAND, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
11
Bestseller
BestsellerE-Book
Book Cover

Improving your Penetration Testing Skills : strengthen your defense against web attacks with Kali Li


Najera-Gutierrez, Gilberto, author.
Birmingham : Packt Publishing, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
12
Bestseller
BestsellerE-Book
Book Cover

In Athena's Camp : Preparing for Conflict in the Information Age.


Arquilla, John.
Santa Monica : RAND Corporation, 1997. 1997

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
13
Bestseller
BestsellerE-Book
Book Cover

Information security governance simplified : from the boardroom to the keyboard


Fitzgerald, Todd.
Boca Raton : CRC Press, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
14
Bestseller
BestsellerE-Book
Book Cover

Internet censorship : protecting citizens or trampling freedom?


Zuchora-Walske, Christine.
Minneapolis : Twenty-First Century Books, 2010. 2010

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
15
Bestseller
BestsellerE-Book
Book Cover

Managing information security



Waltham, MA : Syngress, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
16
Bestseller
BestsellerE-Book
Book Cover

Markets for cybercrime tools and stolen data : hackers' bazaar


Ablon, Lillian, author.
Santa Monica, California ; Washington, District of Columbia : RAND Corporation, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
17
Bestseller
BestsellerE-Book
Book Cover

Mastering Microsoft Forefront UAG 2010 customization : discover the secrets to extending and customi


Ben-Ari, Erez.
Birmingham, UK : Packt Publishing, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
18
Bestseller
BestsellerE-Book
Book Cover

Mobile Security : How to secure, privatize and recover your devices


Speed, Tim.
Birmingham : Packt Publishing, 2013. 2013

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
19
Bestseller
BestsellerE-Book
Book Cover

ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application h


Mischel, Magnus.
Birmingham, U.K. : Packt Pub., [2009] 2009

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
20
Bestseller
BestsellerE-Book
Book Cover

Network and system security



Amsterdam ; Boston : Syngress, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
21
Bestseller
BestsellerE-Book
Book Cover

Nine steps to success : an ISO 27001:2013 implementation overview


Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
22
Bestseller
BestsellerE-Book
Book Cover

Protecting your internet identity : are you naked online?


Claypoole, Ted, 1963-
Lanham : Rowman & Littlefield Publishers, 2011. 2011

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
23
Bestseller
BestsellerE-Book
Book Cover

Rapid acquisition and fielding for information assurance and cyber security in the Navy


Porche, Isaac, 1968- author.
Santa Monica, CA : RAND Corporation, 2012. 2012

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
24
Bestseller
BestsellerE-Book
Book Cover

Security in distributed, grid, mobile, and pervasive computing


Xiao, Yang, 1966-
Boca Raton : Auerbach Publications, [2007] 2007

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  Taylor & Francis Open Access Ebook    Downloadable
All patrons click here to access this title from Taylor & Francis
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK TAYLOR&FRANCIS    Downloadable
Please click here to access this TAYLOR&FRANCIS resource
25
Bestseller
BestsellerE-Book
Book Cover

The smartphone : anatomy of an industry


Woyke, Elizabeth.
New York : The New Press, 2014. 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
Security Computers Networking
26
Bestseller
BestsellerE-Book
Book Cover

At the nexus of cybersecurity and public policy : some basic concepts and issues



Washington, D.C. : The National Academies Press, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
27
Bestseller
BestsellerE-Book
Book Cover

Becoming the hacker : the playbook for getting inside the mind of an attacker


Pruteanu, Adrian, author.
Birmingham : Packt Publishing Ltd, 2019. 2019

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
28
Bestseller
BestsellerE-Book
Book Cover

Crisis and escalation in cyberspace


Libicki, Martin C., author.
Santa Monica, CA : RAND, [2012] 2012

Rating:

 

Copies

Location Call No. Status
 All Libraries - Shared Downloadable Materials  JSTOR Open Access Ebook    Downloadable
All patrons click here to access this title from JSTOR
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK JSTOR    Downloadable
Please click here to access this JSTOR resource
29
Bestseller
BestsellerE-Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress, [2014] 2014

Rating:

 

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
Add Marked to Bag Add All On Page
Locate in results