Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Modify Search
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
505 results found.
Sorted by
relevance
|
date
|
title
.
Result Page
prev
1
2
3
4
5
6
7
8
9
10
11
next
Add All On Page to My List
Keywords (301-350 of 505)
very relevant titles
entries 25-2051
301
2022
The CISO evolution : business knowledge for cybersecurity executives
Sharp, Matthew K., author.
[Place of publication not identified] : Ascent Audio, 2022.
available online
Save to My List
Full Record
More Resources
302
2022
Cloud security for dummies
Coombs, Ted, author.
[Old Saybrook, Connecticut] : Tantor Media, Inc., 2022.
available online
Save to My List
Full Record
More Resources
303
2022
Breached! : why data security law fails and how to improve it
Solove, Daniel J., 1972- author.
[Prince Frederick, Maryland] : Recorded Books, 2022.
available online
Save to My List
Full Record
More Resources
304
2022
Security awareness for dummies
Winkler, Ira, author.
[Old Saybrook, Connecticut] : Tantor Media, Inc., 2022.
available online
Save to My List
Full Record
More Resources
305
2022
Common types of attack
[Place of publication not identified] : Assemble You, 2022.
available online
Save to My List
Full Record
More Resources
306
2022
The security culture playbook : an executive guide to reducing risk and developing your human defens
Carpenter, Perry, author, narrator.
[Place of publication not identified] : Ascent Audio, 2022.
available online
Save to My List
Full Record
More Resources
307
2022
Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybers
Ozkaya, Erdal, author.
[Birmingham] : Packt Publishing, 2022.
available online
Save to My List
Full Record
More Resources
308
2022
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
Borges, Dan, author.
[Birmingham, UK] : Packt Publishing, 2022.
available online
Save to My List
Full Record
More Resources
309
2022
Practical cybersecurity architecture : a guide to creating and implementing robust designs for cyber
Moyle, Ed, 1973- author.
[Birmingham, UK] : Packt Publishing, 2022.
available online
Save to My List
Full Record
More Resources
310
2022
Hack the cybersecurity interview : a complete interview preparation guide for jumpstarting your cybe
Underhill, Ken, author.
[Birmingham, UK] : Packt Publishing Ltd., 2022.
available online
Save to My List
Full Record
More Resources
311
2022
Learn computer forensics : a beginner's guide to searching, analyzing, and securing digital evidence
Oettinger, William, author.
[Place of publication not identified] : Packt Publishing, 2022.
available online
Save to My List
Full Record
More Resources
312
2022
The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack
Singh, Glen D., author.
[Place of publication not identified] : Packt Publishing, 2022.
available online
Save to My List
Full Record
More Resources
313
2022
Secret key cryptography : ciphers, from simple to unbreakable
Rubin, Frank (Cryptographer), author.
[Shelter Island, NY] : Manning Publications Co., [2022]
available online
Save to My List
Full Record
More Resources
314
2022
Operationalizing threat intelligence
Wilhoit, Kyle, author.
[Place of publication not identified] : Packt Publishing, 2022.
available online
Save to My List
Full Record
More Resources
315
2022
Practical social engineering : a primer for the ethical hacker
Gray, Joe, author.
San Francisco : No Starch Press, [2022]
available online
Save to My List
Full Record
More Resources
316
2022
The hardware hacking handbook : breaking embedded security with hardware attacks
Woudenberg, Jasper van, author.
San Francisco, CA : No Starch Press, 2022.
available online
Save to My List
Full Record
More Resources
317
2022
Designing secure software : a guide for developers
Kohnfelder, Loren, author.
San Francisco : No Starch Press, [2022]
available online
Save to My List
Full Record
More Resources
318
2022
Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the in
Lohrmann, Daniel J., 1963- author.
Hoboken, New Jersey : John Wiley & Sons, Inc., [2022]
available online
Save to My List
Full Record
More Resources
319
2022
Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks
Peiris, Chris, author.
Hoboken, New Jersey : John Wiley & Sons, Inc., [2022]
available online
Save to My List
Full Record
More Resources
320
2022
Go h*ck yourself : a simple introduction to cyber attacks and defense
Payne, Bryson, author.
San Francisco : No Starch Press, [2022]
available online
Save to My List
Full Record
More Resources
321
2022
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework
Brumfield, Cynthia, author.
Hoboken, NJ : John Wiley & Sons, Inc., 2022.
available online
Save to My List
Full Record
More Resources
322
2022
Ransomware protection playbook
Grimes, Roger A., author.
Hoboken, New Jersey : Wiley, [2022]
available online
Save to My List
Full Record
More Resources
323
2022
The CISO evolution : business knowledge for cybersecurity executives
Sharp, Matthew K., author.
Hoboken, New Jersey : John Wiley & Sons, Inc., [2022]
available online
Save to My List
Full Record
More Resources
324
2022
Snowflake security : securing your Snowflake data cloud
Herzberg, Ben, author.
[Berkeley] : Apress, [2022]
available online
Save to My List
Full Record
More Resources
325
2022
CEH v11 : certified ethical hacker version 11 practice tests
Messier, Ric, author.
Hoboken, New Jersey : Sybex/John Wiley & Sons, Inc., [2022]
available online
Save to My List
Full Record
More Resources
326
2022
Navigating the cybersecurity career path
Patton, Helen E., author.
Hoboken, New Jersey : John Wiley & Sons, Inc., [2022]
available online
Save to My List
Full Record
More Resources
327
2022
Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud In
Bravo, Cesar.
Birmingham : Packt Publishing, Limited, 2022.
available online
Save to My List
Full Record
More Resources
328
2022
Trust in computer systems and the cloud
Bursell, Mike, author.
Hoboken, NJ : Wiley, [2022]
available online
Save to My List
Full Record
More Resources
329
2022
The art of Mac malware : the guide to analyzing malicious software
Wardle, Patrick, author.
San Francisco : No Starch Press, [2022]
available online
Save to My List
Full Record
More Resources
330
2022
The art of cyberwarfare : an investigator's guide to espionage, ransomware, and organized cybercrime
DiMaggio, Jon, author.
San Francisco : No Starch Press Inc., 2022.
available online
Save to My List
Full Record
More Resources
331
2022
Certified Ethical Hacker (CEH) Exam Cram
Easttom, William, author.
Pearson IT Certification, 2022.
available online
Save to My List
Full Record
More Resources
332
2022
Fight fire with fire : proactive cybersecurity strategies for today's leaders
Tarun, Renee, author.
Hoboken, NJ : John Wiley & Sons, Inc., [2022]
available online
Save to My List
Full Record
More Resources
333
2022
CYBERSECURITY FOR EHEALTH a simplified guide to practical cybersecurity for non-technical... stakeho
OGU, EMMANUEL C.
[S.l.] : ROUTLEDGE, 2022.
available online
Save to My List
Full Record
More Resources
334
2022
Phishing and communication channels a guide to identifying and mitigating phishing attacks
Sonowal, Gunikhan.
[United States] : Apress, 2022.
available online
Save to My List
Full Record
More Resources
335
2022
Teach Yourself VISUALLY Windows 11
McFedries, Paul, author.
Indianapolis : Visual, 2022.
available online
Save to My List
Full Record
More Resources
336
2022
Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber pr
Leirvik, Ryan, author.
[New York, NY] : Apress, [2022]
available online
Save to My List
Full Record
More Resources
337
2022
Getting started with IBM Hyper Protect Data Controller
White, Bill, author.
IBM Redbooks, 2022.
available online
Save to My List
Full Record
More Resources
338
2022
Cybersecurity leadership demystified : a comprehensive guide to becoming a world-class modern cybers
Ozkaya, Erdal, author.
Birmingham : Packt, 2022.
available online
Save to My List
Full Record
More Resources
339
2022
Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.
Hettema, Hinne.
Birmingham : Packt Publishing, Limited, 2022.
available online
Save to My List
Full Record
More Resources
340
2022
Python for cybersecurity : using Python for cyber offense and defense
Poston, Howard E.
Hoboken, NJ : John Wiley, [2022]
available online
Save to My List
Full Record
More Resources
341
2022
CSSLP Certified Secure Software Lifecycle Professional exam guide
Conklin, Wm. Arthur (William Arthur), author.
New York : McGraw-Hill, [2022]
available online
Save to My List
Full Record
More Resources
342
2022
CEH Certified Ethical Hacker Cert guide
Gregg, Michael (Michael C.), author.
[Place of publication not identified] : Pearson Education, Inc., [2022]
available online
Save to My List
Full Record
More Resources
343
2022
Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11
Amberg, Eric, author
[Germany] : mitp Verlag, 2022.
available online
Save to My List
Full Record
More Resources
344
2022
Gray hat hacking : the ethical hacker's handbook
Harper, Allen, author.
New York [NY] : McGraw-Hill, [2022]
available online
Save to My List
Full Record
More Resources
345
2022
A hybrid cloud cyber security solution using IBM Spectrum Virtualize for public cloud on Azure and I
[Place of publication not identified] : IBM Redbooks, [2022]
available online
Save to My List
Full Record
More Resources
346
2022
(ISC)² SSCP Systems Security Certified Practitioner : official practice tests
Chapple, Mike, 1975- author.
[Indianapolis, Indiana] : Sybex., [2022]
available online
Save to My List
Full Record
More Resources
347
2022
Cybersecurity and local government
Norris, Donald F., author.
Hoboken, NJ : John Wiley & Sons, Inc., 2022.
available online
Save to My List
Full Record
More Resources
348
2022
Take control of iOS & iPadOS privacy and security
Fleishman, Glenn, author.
[Place of publication not identified] : Take Control Books, [2022]
available online
Save to My List
Full Record
More Resources
349
2022
WIRELESS SECURITY ARCHITECTURE designing and maintaining secure wireless for enterprise.
MINELLA, JENNIFER.
[S.l.] : JOHN WILEY & SONS, 2022.
available online
Save to My List
Full Record
More Resources
350
2022
Snowflake access control : mastering the features for data privacy and regulatory compliance
Larson, Jessica Megan, author.
[Berkeley] : Apress, [2022]
available online
Save to My List
Full Record
More Resources
locate in results
More Information
Find another book like this
Computer security
at
Novelist
Result Page
prev
1
2
3
4
5
6
7
8
9
10
11
next
Modify Search
Search: