Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Modify Search
View Saved
Clear all records
(Search History)
Keyword: Saint Michael's Mount (England : Island) -- Fiction. in View Entire Collection
(Clear Search History)
(End Search Session)
Search history function requires JavaScript.
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
588 results found.
Sorted by
relevance
|
date
|
title
.
Result Page
prev
1
...
3
4
5
6
7
8
9
10
11
12
next
Add All On Page to My List
Keywords (351-400 of 588)
351
2015
Security in computing
Pfleeger, Charles P., 1948- author.
Upper Saddle River, NJ : Prentice Hall, [2015]
available online
Save to My List
Full Record
More Resources
900639754
352
2015
Group theoretic cryptography
González Vasco, Maria Isabel, author.
Boca Raton, FL : CRC Press LLC, [2015]
available online
Save to My List
Full Record
More Resources
906180651
353
2015
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques
Chauhan, Sudhanshu, author.
Waltham, MA : Syngress, an imprint of Elsevier, 2015.
available online
Save to My List
Full Record
More Resources
907467285
354
2015
Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats
Donaldson, Scott E., author.
[Berkeley, CA] : Apress, [2015]
available online
Save to My List
Full Record
More Resources
910159354
355
2015
Security of block ciphers : from algorithm design to hardware implementation
Sakiyama, Kazuo, 1971-
Singapore : Wiley, [2015]
available online
Save to My List
Full Record
More Resources
911200073
356
2015
Applied cryptography : protocols, algorithms, and source code in C
Schneier, Bruce, 1963- author.
Indianapolis, IN : John Wiley & Sons, [2015]
available online
Save to My List
Full Record
More Resources
914287736
357
2015
Infosec management fundamentals
Dalziel, Henry, author.
Waltham, MA : Elsevier : Syngress, [2015]
available online
Save to My List
Full Record
More Resources
918135803
358
2015
Bent functions : results and applications to cryptography
Tokareva, Natalia, author.
London : Academic Press, [2015]
available online
Save to My List
Full Record
More Resources
919201561
359
2015
Essential cybersecurity science : build, test, and evaluate secure systems
Dykstra, Josiah, author.
Sebastopol, CA : O'Reilly Media, 2016.
available online
Save to My List
Full Record
More Resources
932049602
360
2015
Learning Bitcoin : embrace the new world of finance by leveraging the power of crypto-currencies usi
Caetano, Richard, author.
Birmingham : Packt Publishing, 2015.
available online
Save to My List
Full Record
More Resources
932247992
361
2015
The mobile application hacker's handbook
Chell, Dominic, author.
Indianapolis, IN : John Wiley & Sons, [2015]
available online
Save to My List
Full Record
More Resources
908032082
362
2015
porridge pulleys and Pi
[San Francisco, California, USA] : Kanopy Streaming, 2015.
available online
More...
Save to My List
Full Record
More Resources
363
2015
What Is Decipherment?
[San Francisco, California, USA] : Kanopy Streaming, 2015.
available online
More...
Save to My List
Full Record
More Resources
364
2014
Linux web operations LiveLessons : (sneak peek video training)
Whaley, Ben.
[Place of publication not identified] : Addison-Wesley Professional, 2014.
available online
Save to My List
Full Record
More Resources
882099569
365
2014
Network and system security
Waltham, MA : Syngress, 2014.
available online
Save to My List
Full Record
More Resources
865474324
366
2014
Quantum optics for engineers
Duarte, F. J. (Frank J.)
Boca Raton, FL : CRC Press, ©2014.
available online
Save to My List
Full Record
More Resources
869224439
367
2014-
CISSP Training Kit.
Miller, David R., author.
Redmond : Microsoft Press 2014.
available online
Save to My List
Full Record
More Resources
883469739
368
2014
Platform embedded security technology revealed : safeguarding the future of computing with Intel Emb
Ruan, Xiaoyu, author.
Berkeley, CA : Apress, 2014.
available online
Save to My List
Full Record
More Resources
890133382
369
2014
The InfoSec handbook : an introduction to information security
Rao, Umesh Hodeghatta, author.
Berkeley, CA : ApressOpen, 2014.
available online
Save to My List
Full Record
More Resources
891381085
370
2014
CompTIA Security+ certification practice exams : (Exam SY0-401)
Lachance, Daniel.
New York : McGraw-Hill Education, ©2014.
available online
Save to My List
Full Record
More Resources
894514757
371
2014
CompTIA security+ (exam SY0-401)
Dunkerley, Dawn.
New York : McGraw-Hill Education, ©2014.
available online
Save to My List
Full Record
More Resources
894906730
372
2014
Information security management handbook .
Boca Raton [Fla.] : CRC Press, 2014.
available online
Save to My List
Full Record
More Resources
859159601
373
2014
Official (ISC)2® guide to the ISSAP® CBK®
Boca Raton, FL : CRC Press, [2014]
available online
Save to My List
Full Record
More Resources
861528316
374
2014
Hacking point of sale : payment application secrets, threats, and solutions
Gomzin, Slava, author.
Indianapolis, IN : Wiley, [2014]
available online
Save to My List
Full Record
More Resources
874160809
375
2014
Information security : principles and practices
Merkow, Mark S.
Indianapolis, Ind. : Pearson Education, ©2014.
available online
Save to My List
Full Record
More Resources
881184273
376
2014
Pro Windows 8.1 development with XAML and C#
Liberty, Jesse, author.
[Berkeley, California] : Apress, 2014.
available online
Save to My List
Full Record
More Resources
881221327
377
2014
Computing : a historical and technical perspective
Boca Raton, Florida : CRC Press, 2014.
available online
Save to My List
Full Record
More Resources
882245835
378
2014
Optimizing IEEE 802.11i resource and security essentials : for mobile and stationary devices
Naraei, Parisa, author.
Amsterdam : Syngress is an imprint of Elsevier, [2014]
available online
Save to My List
Full Record
More Resources
898422491
379
2014
How I discovered World War II's greatest spy : and other stories of intelligence and code
Kahn, David, 1930-
Boca Raton : CRC Press, Taylor & Francis Group, [2014]
available online
Save to My List
Full Record
More Resources
901239745
380
2014
Theory of computational complexity
Du, Dingzhu, author.
Hoboken, New Jersey : John Wiley & Sons, 2014.
available online
Save to My List
Full Record
More Resources
864753086
381
2014
The basics of information security : understanding the fundamentals of InfoSec in theory and practic
Andress, Jason, author.
Waltham, MA : Syngress, 2014.
available online
Save to My List
Full Record
More Resources
880706587
382
2014
Alan Turing : the enigma : the book that inspired the film The Imitation Game
Hodges, Andrew.
Princeton, [New Jersey] : Princeton University Press, [2014]
Location
Call No.
Status
95th Street Adult Biography
BIO TURING
DUE 06-09-24
Nichols Adult Biography
BIO TURING
AVAILABLE
Save to My List
Full Record
Place a hold
More Resources
ocn881139563
383
2013
Mathematics is power
Bloch, William Goldbloom.
[United States] : Recorded Books, Inc., 2013.
available online
More...
Save to My List
Full Record
More Resources
384
2013
Speaking secret codes
Bell-Rehwoldt, Sheri.
[United States] : Capstone Press, 2013.
available online
More...
Save to My List
Full Record
More Resources
385
2013
Cryptography : cracking codes
New York, NY : Britannica Educational Publishing, In Association With Rosen Educational Services, 2013.
available online
Save to My List
Full Record
More Resources
386
2013
Kryptografie : verfahren, protokolle, infrastrukturen
Schmeh, Klaus.
Heidelberg : Dpunkt.verlag, ©2013.
available online
Save to My List
Full Record
More Resources
854765799
387
2013
Cyber security and IT infrastructure protection
Amsterdam ; Boston : Syngress, 2013.
available online
Save to My List
Full Record
More Resources
857277688
388
2013
Cryptography : Infosec pro guide
Oriyano, Sean-Philip.
New York : McGraw-Hill Education, ©2013.
available online
Save to My List
Full Record
More Resources
865474311
389
2013
Information theory : coding and cryptography
Saha, A. (Arjit)
New Delhi : Dorling Kindersley (India), ©2013.
available online
Save to My List
Full Record
More Resources
889760587
390
2013
Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
Parker, Frederick D., author.
Fort George G. Meade, Md. : Center for Cryptologic History, National Security Agency, 2013.
available online
Save to My List
Full Record
More Resources
893472013
391
2013
Masked dispatches : cryptograms and cryptology in American history, 1775-1900
Weber, Ralph E. (Ralph Edward), 1926- author.
[Fort George G. Meade, MD] : Center for Cryptologic History, National Security Agency, 2013.
available online
Save to My List
Full Record
More Resources
893484406
392
2013
Sharing the burden : women in cryptology during World War II
Wilcox, Jennifer E., author.
Fort George G. Meade, Md. : Center for Cryptologic History, National Security Agency, reprinted 2013.
available online
Save to My List
Full Record
More Resources
893484524
393
2013
CISSP Cert Guide
McMillan, Troy, author.
Pearson IT Certification, 2013.
available online
Save to My List
Full Record
More Resources
394
2013
Information security management principles
Alexander, David (Information security practitioner)
Swindon, U.K. : BCS Learning & Development Ltd., 2013.
available online
Save to My List
Full Record
More Resources
854569528
395
2013
Essential algorithms : a practical approach to computer algorithms
Stephens, Rod, 1961- author.
Indianapolis, IN : Wiley, [2013]
available online
Save to My List
Full Record
More Resources
854977401
396
2013
Elements of quantum computation and quantum communication
Pathak, Anirban.
Boca Raton, FL : CRC Press, ©2013.
available online
Save to My List
Full Record
More Resources
859524142
397
2013
Node.js recipes
Gackenheimer, Cory, author.
Berkeley, CA : Apress, ©2013.
available online
Save to My List
Full Record
More Resources
868040679
398
2012
Seizing the enigma : the race to break the German U-boat codes, 1939-1943
Kahn, David, 1930-
[United States] : Blackstone Publishing, 2012.
available online
More...
Save to My List
Full Record
More Resources
399
2012
Nine algorithms that changed the future : the ingenious ideas that drive today's computers
MacCormick, John, 1972-
Princeton, N.J. : Princeton University Press, 2012.
Location
Call No.
Status
Nichols Adult Nonfiction
006.3 MAC 2012
AVAILABLE
Save to My List
Full Record
Place a hold
More Resources
ocn711959719
400
2012
Spy codes and ciphers
Mitchell, Susan K.
Berkeley Heights, NJ : Enslow Publishers, [2012]
Location
Call No.
Status
95th Street Juvenile Nonfiction
J 652.8 MIT
AVAILABLE
Naper Blvd. Juvenile Nonfiction
J 652.8 MIT
AVAILABLE
Save to My List
Full Record
Place a hold
More Resources
ocn531718777
locate in results
More Information
Find another book like this
Cryptography.
at
Novelist
Result Page
prev
1
...
3
4
5
6
7
8
9
10
11
12
next
Modify Search
View Saved
Clear all records
(Search History)
Keyword: Saint Michael's Mount (England : Island) -- Fiction. in View Entire Collection
(Clear Search History)
(End Search Session)
Search: