1491. Emerging technologies for business professionals : a nontechnical guide to the governance and management of disruptive technologies /: a nontechnical guide to the governance and management of disruptive technologies. (2023) Authors: Vincent, Nishani; Igou, Amy Record Type: Book Extent: 1 online resource (304 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1492. LPI Security Essentials study guide. (2023) Authors: (IT specialist), Clinton, David Record Type: Book Extent: 1 online resource (208 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1493. Privacy in a cyber age : policy and practice /: policy and practice. (2015) Authors: Etzioni, Amitai Record Type: Book Extent: 1 online resource (264 pages), (1 illustrations) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1494. Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems /: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems. (2016) Editors: Griffor, Edward R Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1495. Checkpoint NG : next generation security administration /: next generation security administration. (2002) Other Names: Simonis, Drew; Amon, Cherie Record Type: Book Extent: 1 online resource (800 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1496. No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing /: a guide to social engineering, dumpster diving, and shoulder surfing. (2011) Other Names: Long, Johnny; Mitnick, Kevin D (Kevin David), 1963- Record Type: Book Extent: 1 online resource (384 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1497. Security without obscurity : a guide to confidentiality, authentication, and integrity /: a guide to confidentiality, authentication, and integrity. (2014) Authors: Stapleton, Jeffrey James Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1498. Psychosocial dynamics of cyber security. (2016) Editors: Zaccaro, Stephen J; Dalal, Reeshad S; Steinke, Julie A; Tetrick, Lois E Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1499. Snort 2.0 intrusion detection. (2003) Other Names: Beale, Jay; Foster, James C Record Type: Book Extent: 1 online resource (550 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1500. Hacking the hacker : learn from the experts who take down hackers /: learn from the experts who take down hackers. (2017) Authors: Grimes, Roger A Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗