51. Cisco security professional's guide to secure intrusion detection systems. (2003) Other Names: Burton, James; Dubrawsky, Ida; Osipov, Vitaly; Baumrucker, C. Tate; Sweeney, Michael Record Type: Book Extent: 1 online resource (656 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
52. Advanced persistent training : take your security awareness program to the next level /: take your security awareness program to the next level. (2017) Authors: Schroeder, Jordan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
53. Building a comprehensive IT security program : practical guidelines and best practices /: practical guidelines and best practices. (2016) Authors: Wittkop, Jeremy Record Type: Book Extent: 1 online resource (xix, 195 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
54. Enterprise Mac security : El capitan /: El capitan. (2015) Authors: Edge, Charles; (CISSO), O'Donnell, Daniel Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
55. Cyber security on Azure : an IT professionals guide to Microsoft Azure security center /: an IT professionals guide to Microsoft Azure security center. (2017) Other Names: Copeland, Marshall Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
56. Self- and co-regulation in cybercrime, cybersecurity and national security. (2015) Authors: Tropina, Tatiana; Callanan, Cormac Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
57. Cybersecurity in Israel. ([2015]) Authors: Tabansky, Lior; Ben-Israel, Isaac Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
58. Information security education across the curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings /: 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings. (2015) Editors: Bishop, Matt (Matthew A.); Miloslavskaya, Natalia; Theocharidou, Marianthi Other Names: World Conference on Information Security Education, 9th Record Type: Book Extent: 1 online resource (xii, 159 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
59. Protecting privacy in data release. ([2015]) Authors: Livraga, Giovanni Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
60. Pattern and security requirements : engineering-based establishment of security standards /: engineering-based establishment of security standards. ([2015]) Authors: Beckers, Kristian Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗