Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
79 results found. Sorted by relevance | date | title .
Result Page     
Add All On Page to My List
Keywords (1-50 of 79)
Very relevant 

very relevant titles

 entries 1-38
3
EBOOK
2021
CEH v11 certified ethical hacker study guide
Messier, Ric, author.
Hoboken, new Jersey : Sybex, a Wiley brand, [2021]
Click for more information
No one has rated this material
4
EVIDEO
2021
No one has rated this material
5
EBOOK
2020
Securing Blockchain Networks like Ethereum and Hyperledger Fabric
Parisi, Alessandro.
[Place of publication not identified] Packt Publishing, 2020.
Click for more information
No one has rated this material
9
EBOOK
2018
Solving Cyber Risk : Protecting Your Company and Society.
Coburn, Andrew.
Newark : John Wiley & Sons, Incorporated, 2018.
Click for more information
No one has rated this material
10
EBOOK
2017
Network and data security for non-engineers
Groom, Frank M., author.
Boca Raton, FL : CRC Press, [2017]
Click for more information
No one has rated this material
11
EBOOK
2017
Click for more information
No one has rated this material
12
EBOOK
2017
Network forensics
Messier, Ric, author.
Indianapolis, IN : Wiley, 2017.
Click for more information
No one has rated this material
14
EVIDEO
2016
Ethical Hacking: Sniffers.
Bock, Lisa speaker.
Carpenteria, CA linkedin.com, 2016.
No one has rated this material
15
EBOOK
2016
Secure your Node.js web application : keep attackers out and users happy
Düüna, Karl, author.
[Place of publication not identified] : Pragmatic Bookshelf, 2016.
Click for more information
No one has rated this material
17
EBOOK
2015
Securing VoIP : keeping your VoIP network safe
Bates, Regis J., author.
Waltham, MA : Syngress, [2015]
Click for more information
No one has rated this material
19
EBOOK
2015
Click for more information
No one has rated this material
22
EBOOK
2012
Click for more information
No one has rated this material
23
EBOOK
2011
Computer security fundamentals
Easttom, Chuck.
Indianapolis, IN : Pearson, 2011, ©2012.
Click for more information
No one has rated this material
24
EBOOK
2009
Computer security handbook.

Hoboken, N.J. : John Wiley & Sons, ©2009.
Click for more information
No one has rated this material
25
EBOOK
2007
Click for more information
No one has rated this material
26
EBOOK
2006
How personal & Internet security works
Gralla, Preston.
[Indianapolis, Ind.] : Que Pub., 2006.
Click for more information
No one has rated this material
27
EBOOK
2006
Hunting security bugs
Gallagher, Tom.
Redmond, Wash. : Microsoft Press, 2006.
Click for more information
No one has rated this material
28
EBOOK
2006
Click for more information
No one has rated this material
29
EBOOK
2005
Preventing web attacks with Apache
Barnett, Ryan C.
Upper Saddle River, NJ : Addison-Wesley, ©2005.
Click for more information
No one has rated this material
30
EBOOK
2005
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
Skoudis, Ed.
Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference, 2005.
Click for more information
No one has rated this material
31
EBOOK
2005
Network security : a practical approach
Harrington, Jan L.
San Francisco, CA : Morgan Kaufmann Publishers, ©2005.
Click for more information
No one has rated this material
32
EBOOK
2004
Defend I.T. : security by example
Gupta, Ajay.
Boston : Addison-Wesley, ©2004.
No one has rated this material
33
EBOOK
2004
The effective incident response team
Lucas, Julie, 1964-
Boston : Addison-Wesley, 2004.
No one has rated this material
34
EBOOK
2004
Internet Denial of Service: Attack and Defense Mechanisms
Mirkovic, Jelena, author.
[Place of publication not identified] : Pearson, 2004.
Click for more information
No one has rated this material
35
EBOOK
2004
Assessing network security
Lam, Kevin.
Redmond, Wash. : Microsoft Press, ©2004.
Click for more information
No one has rated this material
37
EBOOK
2003
Practical UNIX and Internet security
Garfinkel, Simson.
Beijing ; Farnham [Surrey] : O'Reilly, ©2003.
Click for more information
No one has rated this material
38
EBOOK
2002
Click for more information
No one has rated this material
Other relevant 

other relevant titles

 entries 39-79
39
EBOOK
2023
Click for more information
No one has rated this material
44
EAUDIOBOOK
2022
Common types of attack

[Place of publication not identified] : Assemble You, 2022.
Click for more information
No one has rated this material
45
EBOOK
2022
CEH Certified Ethical Hacker Cert guide
Gregg, Michael (Michael C.), author.
[Place of publication not identified] : Pearson Education, Inc., [2022]
No one has rated this material
47
EBOOK
2022
Cyber-physical systems : foundations and techniques

Hoboken, NJ : John Wiley & Sons, Inc. ; Beverly, MA : Scrivener Publishing LLC, 2022.
Click for more information
No one has rated this material
48
EBOOK
2022
Ransomware & cyber extortion : response and prevention
Davidoff, Sherri, author.
Boston : Addison-Wesley Professional, 2022.
No one has rated this material
50
EBOOK
2021
Principles of computer security : CompTIA Security+ and beyond, (exam SY0-501)
Conklin, Wm. Arthur (William Arthur), author.
New York : McGraw-Hill, 2021.
Click for more information
No one has rated this material
locate in results
More Information
Find another book like this Denial of service attacks at Novelist
Result Page