Your search returned 24 results.

Sort
Results
Computer and network security in higher education / edited by Mark Luker and Rodney Petersen by Series: EDUCAUSE leadership strategies ; number 8
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco, CA : Jossey-Bass, [2003]
Availability: Items available for reference: Main Library: Room use only (1)Call number: R 005.8 C738 2003.

Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : McGraw-Hill/Irwin, [2007]
Availability: Items available for loan: Main Library (1)Call number: C 005.8 Sc376i 2007.

Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Christopher Steuart by
Edition: 4th edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia : Course Technology Cengage Learning, [2010]
Availability: Items available for reference: Main Library: Room use only (1)Call number: R 005.8 N424g 2010.

Hands-on ethical hacking and network defense / Michael T. Simpson, Kent Backman, and James E. Corley by
Edition: 2nd edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia : Course Technology/Cengage Learning, [2011]
Availability: Items available for reference: Main Library: Room use only (1)Call number: R 005.8 Si613h 2011.

Maximum Linux security : a hacker's guide to protecting your Linux server and workstation
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, Indiana : Sams Publishing, [2000]
Availability: Items available for loan: Main Library (1)Call number: C 005.8 M464 2000.

Cybersecurity : engineering a secure information technology organization / Dan Shoemaker, Kenneth Sigler by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Stamford, CT : Cengage Learning, ©2015
Availability: Items available for reference: Main Library: Room use only (1)Call number: R 005.8 Sh559c 2015.

Security without obscurity : a guide to PKI operations / J. J. Stapleton, W. Clay Epstein by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, 2016
Availability: Items available for reference: Main Library: Room use only (1)Call number: R 005.8 St794s 2016.

Cybersecurity law by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hoboken, NJ : John Wiley & Sons, 2017
Availability: Items available for reference: Main Library: Room use only (1)Call number: LRC 343.730999 K86c 2017.

Management of information security / Michael E. Whitman, Herbert J. Mattord by
Edition: Fifth edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston, MA : Cengage Learning, [2017]
Availability: Items available for reference: Main Library: Room use only (1)Call number: R 658.478 W615m 2017.

Rational cybersecurity for business : the security leaders’ guide to business alignment / Dan Blum by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: New York : Apress Open, [2020]
Online resources:
Availability: Items available for loan: Accessible online (1).

Group policy : fundamentals, security, and the managed desktop / Jeremy Moskowitz by
Edition: Second edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hoboken, New Jersey : John Wiley & Sons, [2013]
Availability: Items available for loan: Cubao Branch (1)Call number: R 005.446 M911g 2013.

Computer security
Material type: Computer file Computer file; Format: electronic available online remote
Publisher: [Canada] : 3G E-Learning Smart Library, 2020
Online resources:
Availability: Items available for loan: Accessible online (1).

Information security management : concepts and practice / Bel G. Raggad by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, [2010]
Availability: Items available for loan: Matandang Balara Branch (1)Call number: C 005.8 R142i 2010.

Cyber security and private data brokerage
Material type: Computer file Computer file; Format: electronic available online remote
Publisher: [Canada] : 3G E-Learning Smart Library, 2020
Online resources:
Availability: Items available for loan: Accessible online (1).

CEH : certified ethical hacking
Material type: Computer file Computer file; Format: electronic available online remote
Publisher: [Canada] : 3G E-Learning Smart Library, 2020
Online resources:
Availability: Items available for loan: Accessible online (1).

Safe space : a kids guide to data privacy / texts, Gigo Alampay ; edit and research, Agay Llanera and Faye Gonzales ; illustrations, Abi Goy [and three others] by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction ; Audience: Juvenile;
Language: English Language: Tagalog Publisher: Quezon City : CANVAS, [2020]
Online resources:
Availability: Items available for loan: Accessible online (1).

Internet services and security Series: Ferguson's careers in focus
Edition: Third edition
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publisher: New York : Ferguson, [2021]
Online resources:
Availability: Items available for loan: Accessible online (1).