1. Advanced persistent training : take your security awareness program to the next level /: take your security awareness program to the next level. (2017) Authors: Schroeder, Jordan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Building a comprehensive IT security program : practical guidelines and best practices /: practical guidelines and best practices. (2016) Authors: Wittkop, Jeremy Record Type: Book Extent: 1 online resource (xix, 195 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Cyber security on Azure : an IT professionals guide to Microsoft Azure security center /: an IT professionals guide to Microsoft Azure security center. (2017) Other Names: Copeland, Marshall Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. IT security risk control management : an audit preparation plan /: an audit preparation plan. (©2016) Other Names: Pompon, Raymond Record Type: Book Extent: 1 online resource (328 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Penetration testing basics : a quick-start guide to breaking into systems /: a quick-start guide to breaking into systems. (2016) Authors: Messier, Ric Record Type: Book Extent: 1 online resource (xv, 114 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Asset attack vectors : building effective vulnerability management strategies to protect organizations /: building effective vulnerability management strategies to protect organizations. (2018) Other Names: Haber, Morey J; Hibbert, Brad Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Open source intelligence methods and tools : a practical guide to online intelligence /: a practical guide to online intelligence. (2018) Authors: Hassan, Nihad A; Hijazi, Rami Record Type: Book Extent: 1 online resource (xxiii, 354 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Personal cybersecurity : how to avoid and recover from cybercrime /: how to avoid and recover from cybercrime. ([2017]) Authors: Waschke, Marvin Record Type: Book Extent: 1 online resource (240 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. IOS penetration testing : a definitive guide to iOS security /: a definitive guide to iOS security. (2016) Authors: Relan, Kunal Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies /: a step-by-step guide to computer security for non-techies. (2018) Authors: Parker, Carey Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗