Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Modify Search
(Search History)
Keyword: Denial of service attacks in View Entire Collection
(Clear Search History)
(End Search Session)
Search history function requires JavaScript.
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
79 results found.
Sorted by
relevance
|
date
|
title
.
Result Page
1
2
next
Add All On Page to My List
Keywords (1-50 of 79)
very relevant titles
entries 1-38
1
2023
Information security handbook : enhance your proficiency in information security program development
Death, Darren, author.
Birmingham, UK : Packt Publishing Ltd., 2023.
available online
Save to My List
Full Record
More Resources
2
2021
AWS Certified Security Study Guide : Specialty (SCS-C01) Exam
Neto, Marcello Zillo.
Indianapolis : Sybex, 2021.
available online
Save to My List
Full Record
More Resources
3
2021
CEH v11 certified ethical hacker study guide
Messier, Ric, author.
Hoboken, new Jersey : Sybex, a Wiley brand, [2021]
available online
Save to My List
Full Record
More Resources
4
2021
Threat Modeling: Denial of Service and Elevation of Privilege.
Shostack, Adam speaker.
Carpenteria, CA linkedin.com, 2021.
available online
More...
Save to My List
Full Record
More Resources
5
2020
Securing Blockchain Networks like Ethereum and Hyperledger Fabric
Parisi, Alessandro.
[Place of publication not identified] Packt Publishing, 2020.
available online
Save to My List
Full Record
More Resources
6
2018
Patterns in Node package vulnerabilities : essential findings for busy developers
Karande, Chetan, author.
Sebastopol, CA : O'Reilly Media, [2018]
available online
Save to My List
Full Record
More Resources
7
2018
Distributed Denial of Service (DDoS) : practical detection and defense
Chou, Eric, author.
Sebastopol, CA : O'Reilly Media, [2018]
available online
Save to My List
Full Record
More Resources
8
2018
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS
Gupta, Rajneesh, author.
Birmingham, UK : Packt Publishing, [2018]
available online
Save to My List
Full Record
More Resources
9
2018
Solving Cyber Risk : Protecting Your Company and Society.
Coburn, Andrew.
Newark : John Wiley & Sons, Incorporated, 2018.
available online
Save to My List
Full Record
More Resources
10
2017
Network and data security for non-engineers
Groom, Frank M., author.
Boca Raton, FL : CRC Press, [2017]
available online
Save to My List
Full Record
More Resources
11
2017
Personal cybersecurity : how to avoid and recover from cybercrime
Waschke, Marvin, author.
Bellingham, Washington : Apress, [2017]
available online
Save to My List
Full Record
More Resources
968706017
12
2017
Network forensics
Messier, Ric, author.
Indianapolis, IN : Wiley, 2017.
available online
Save to My List
Full Record
More Resources
994006202
13
2017
Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to s
Buchanan, Cameron, author.
Birmingham, UK : Packt Publishing, 2017.
available online
Save to My List
Full Record
More Resources
14
2016
Ethical Hacking: Sniffers.
Bock, Lisa speaker.
Carpenteria, CA linkedin.com, 2016.
available online
More...
Save to My List
Full Record
More Resources
15
2016
Secure your Node.js web application : keep attackers out and users happy
Düüna, Karl, author.
[Place of publication not identified] : Pragmatic Bookshelf, 2016.
available online
Save to My List
Full Record
More Resources
941101200
16
2016
Learning Proxmox VE : unleash the power of Proxmox VE by setting up a dedicated virtual environment
Goldman, Rik, author.
Birmingham, UK : Packt Publishing, 2016.
available online
Save to My List
Full Record
More Resources
946944178
17
2015
Securing VoIP : keeping your VoIP network safe
Bates, Regis J., author.
Waltham, MA : Syngress, [2015]
available online
Save to My List
Full Record
More Resources
899245478
18
2015
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and o
Knapp, Eric D., author.
Waltham, MA : Syngress, [2015]
available online
Save to My List
Full Record
More Resources
900652416
19
2015
Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE
Pale, Paulino Calderon, author.
Birmingham, UK : Packt Publishing, 2015.
available online
Save to My List
Full Record
More Resources
905245095
20
2015
Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless
Alamanni, Marco, author.
Birmingham, UK : Packt Publishing, 2015.
available online
Save to My List
Full Record
More Resources
918862369
21
2014
Case studies in secure computing : achievements and trends
Boca Raton : Auerbach, 2014.
available online
Save to My List
Full Record
More Resources
22
2012
Nmap 6 : network exploration and security auditing Cookbook
Pale, Paulino Calderon.
Birmingham : Packt Pub., 2012.
available online
Save to My List
Full Record
More Resources
825076489
23
2011
Computer security fundamentals
Easttom, Chuck.
Indianapolis, IN : Pearson, 2011, ©2012.
available online
Save to My List
Full Record
More Resources
794596009
24
2009
Computer security handbook.
Hoboken, N.J. : John Wiley & Sons, ©2009.
available online
Save to My List
Full Record
More Resources
440646866
25
2007
LAN switch security : what hackers know about your switches
Vyncke, Eric.
Indianapolis, Ind. : Cisco Press, 2007.
available online
Save to My List
Full Record
More Resources
183318228
26
2006
How personal & Internet security works
Gralla, Preston.
[Indianapolis, Ind.] : Que Pub., 2006.
available online
Save to My List
Full Record
More Resources
73814269
27
2006
Hunting security bugs
Gallagher, Tom.
Redmond, Wash. : Microsoft Press, 2006.
available online
Save to My List
Full Record
More Resources
85789106
28
2006
Handbook of information security.
Hoboken, N.J. : John Wiley, ©2006.
available online
Save to My List
Full Record
More Resources
271872721
29
2005
Preventing web attacks with Apache
Barnett, Ryan C.
Upper Saddle River, NJ : Addison-Wesley, ©2005.
available online
Save to My List
Full Record
More Resources
79872646
30
2005
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
Skoudis, Ed.
Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference, 2005.
available online
Save to My List
Full Record
More Resources
123904762
31
2005
Network security : a practical approach
Harrington, Jan L.
San Francisco, CA : Morgan Kaufmann Publishers, ©2005.
available online
Save to My List
Full Record
More Resources
824488326
32
2004
Defend I.T. : security by example
Gupta, Ajay.
Boston : Addison-Wesley, ©2004.
available online
Save to My List
Full Record
More Resources
57254682
33
2004
The effective incident response team
Lucas, Julie, 1964-
Boston : Addison-Wesley, 2004.
available online
Save to My List
Full Record
More Resources
243552052
34
2004
Internet Denial of Service: Attack and Defense Mechanisms
Mirkovic, Jelena, author.
[Place of publication not identified] : Pearson, 2004.
available online
Save to My List
Full Record
More Resources
35
2004
Assessing network security
Lam, Kevin.
Redmond, Wash. : Microsoft Press, ©2004.
available online
Save to My List
Full Record
More Resources
60696315
36
2003
Inside Java 2 platform security : architecture, API design, and implementation
Gong, Li.
Boston : Addison-Wesley, ©2003.
available online
Save to My List
Full Record
More Resources
606979053
37
2003
Practical UNIX and Internet security
Garfinkel, Simson.
Beijing ; Farnham [Surrey] : O'Reilly, ©2003.
available online
Save to My List
Full Record
More Resources
54116488
38
2002
Hack I.T. : security through penetration testing
Klevinsky, T. J.
Boston : Addison-Wesley, ©2002.
available online
Save to My List
Full Record
More Resources
52355481
other relevant titles
entries 39-79
39
2023
Mike Meyers' CompTIA Network+ Certification Passport (Exam N10-008)
Meyers, Mike, 1961-
New York : McGraw-Hill Education, 2023.
available online
Save to My List
Full Record
More Resources
40
2023
THREATS what every engineer should learn from star wars.
Shostack, Adam.
[S.l.] : JOHN WILEY & SONS, 2023.
available online
Save to My List
Full Record
More Resources
41
2023
Cyber essentials a guide to the Cyber Essentials and Cyber Essentials Plus certifications.
[S.l.] : IT GOVERNANCE PUBLISHING, 2023.
available online
Save to My List
Full Record
More Resources
42
2022
CompTIA Network+ (N10-008) Cert Prep: 9 Network Security and Monitoring.
Meyers, Mike speaker.
Carpenteria, CA linkedin.com, 2022.
available online
More...
Save to My List
Full Record
More Resources
43
2022
CompTIA Network+ (N10-008) Cert Prep: 9 Network Security and Monitoring.
Meyers, Mike speaker.
Carpenteria, CA linkedin.com, 2022.
available online
More...
Save to My List
Full Record
More Resources
44
2022
Common types of attack
[Place of publication not identified] : Assemble You, 2022.
available online
Save to My List
Full Record
More Resources
45
2022
CEH Certified Ethical Hacker Cert guide
Gregg, Michael (Michael C.), author.
[Place of publication not identified] : Pearson Education, Inc., [2022]
available online
Save to My List
Full Record
More Resources
46
2022
CYBERSECURITY IN SMART HOMES architectures, solutions and technologies.
KHATOUN, RIDA.
[S.l.] : JOHN WILEY, 2022.
available online
Save to My List
Full Record
More Resources
47
2022
Cyber-physical systems : foundations and techniques
Hoboken, NJ : John Wiley & Sons, Inc. ; Beverly, MA : Scrivener Publishing LLC, 2022.
available online
Save to My List
Full Record
More Resources
48
2022
Ransomware & cyber extortion : response and prevention
Davidoff, Sherri, author.
Boston : Addison-Wesley Professional, 2022.
available online
Save to My List
Full Record
More Resources
49
2021
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetr
Sheikh, Ahmed.
Berkeley, CA : Apress L.P., 2021.
available online
Save to My List
Full Record
More Resources
50
2021
Principles of computer security : CompTIA Security+ and beyond, (exam SY0-501)
Conklin, Wm. Arthur (William Arthur), author.
New York : McGraw-Hill, 2021.
available online
Save to My List
Full Record
More Resources
locate in results
More Information
Find another book like this
Denial of service attacks
at
Novelist
Result Page
1
2
next
Modify Search
(Search History)
Keyword: Denial of service attacks in View Entire Collection
(Clear Search History)
(End Search Session)
Search: