Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
More Resources
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
Result Page
1
2
3
4
5
6
7
8
9
10
11
...
13
next
Add All On Page to My List
Subjects (1-50 of 622)
Computer networks -- Security measures -- Juvenile literature.
1
2018
Google cybersecurity expert Parisa Tabriz
Di Piazza, Domenica, author.
Minneapolis : Lerner Publications, [2018]
Location
Call No.
Status
95th Street Juvenile Biography
J BIO TABRIZ
AVAILABLE
Save to My List
Full Record
Place a hold
More Resources
sky288350031
2
2019
The hidden world of hackers : expressions
Wallace, Elise, author.
Huntington Beach, CA : Teacher Created Materials, [2019]
available online
Save to My List
Full Record
More Resources
3
2019
My digital safety and security
Hubbard, Ben, 1973- author.
Minneapolis : Lerner Publications, 2019.
Location
Call No.
Status
95th Street Juvenile Nonfiction
J 005.8 HUB
AVAILABLE
Naper Blvd. Juvenile Nonfiction
J 005.8 HUB
AVAILABLE
Save to My List
Full Record
Place a hold
More Resources
Computer networks -- Security measures -- Management.
4
2024
Cyber guardians : empowering board members for effective cybersecurity
McDonough, Bart, author.
Hoboken, New Jersey : John Wiley & Sons, Inc., [2024]
available online
Save to My List
Full Record
More Resources
5
2019
Getting Started with Ghidra
Messier, Ric, author.
O'Reilly Media, Inc., 2019.
available online
Save to My List
Full Record
More Resources
6
2019
Hands-on cybersecurity for finance : identify vulnerabilities and secure your financial services fro
Ozkaya, Erdal, author.
Birmingham, UK : Packt Publishing, 2019.
available online
Save to My List
Full Record
More Resources
7
2018
Learn Ansible : automate cloud, security, and network infrastructure using Ansible 2.x
McKendrick, Russ, author.
Birmingham, UK : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
Computer networks -- Security measures -- Mathematics.
8
2016
Modern cryptography : applied mathematics for encryption and information security
Easttom, Chuck, author.
New York : McGraw-Hill Education, [2016]
available online
Save to My List
Full Record
More Resources
934650284
Computer networks -- Security measures -- Popular works.
9
2015
Web security : a whitehat perspective
Wu, Hanqing, author.
Boca Raton : Taylor & Francis, CRC Press, [2015]
available online
Save to My List
Full Record
More Resources
906026040
Computer networks -- Security measures -- Problems, exercises, etc.
10
2012
CCNA Security 640-554 Official Cert Guide.
Barker, Keith, Author.
[Place of publication not identified] : Cisco Press, 2012
available online
Save to My List
Full Record
More Resources
11
2021
Comptia security+ certification practice exams, (Exam SY0-601).
Lachance, Daniel.
New York : McGraw-Hill Education, 2021.
available online
Save to My List
Full Record
More Resources
Computer networks -- Security measures -- Quality control.
12
2008
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and
Mehan, Julie E.
Ely, UK : IT Governance, 2008.
available online
Save to My List
Full Record
More Resources
652389822
Computer networks -- Security measures -- Software.
13
2021
Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade an
Yehoshua, Nir, author.
Birmingham, UK : Packt Publishing Limited, 2021.
available online
Save to My List
Full Record
More Resources
14
2019
IBM Spectrum Protect Plus : practical guidance for deployment, configuration, and usage
Gaschler, Andre, author.
Poughkeepsie, NY : IBM Corporation, IBM Redbooks, 2019.
available online
Save to My List
Full Record
More Resources
15
2022
Learn Wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks us
Bock, Lisa, author.
Birmingham, UK : Packt Publishing Ltd., 2022.
available online
Save to My List
Full Record
More Resources
16
2019
Learn Wireshark : Confidently Navigate the Wireshark Interface and Solve Real-World Networking Probl
Bock, Lisa.
Birmingham : Packt Publishing, Limited, 2019.
available online
Save to My List
Full Record
More Resources
17
2015
Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet
Slagle, Jason, author.
Birmingham, UK : Packt Publishing, 2015.
available online
Save to My List
Full Record
More Resources
908029851
18
2023
Mastering Palo Alto networks : build, configure and deploy network solutions for your infrastructure
Piens, Tom, author.
[Place of publication not identified] : Packt Publishing, 2023.
available online
Save to My List
Full Record
More Resources
19
2022
Mastering Palo Alto networks : build, configure and deploy network solutions for your infrastructure
Piens, Tom, author.
[Birmingham, United Kingdom] : Packt Publishing Ltd., [2022]
available online
Save to My List
Full Record
More Resources
20
2018
Mastering reverse engineering : re-engineer your ethical hacking skills
Wong, Reginald, author.
Birmingham, UK : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
21
2005
Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultant
Ratliff, Bud, 1970-
Redmond, Wash. : Microsoft Press, 2005, ©2006.
available online
Save to My List
Full Record
More Resources
73814286
22
2005
MPLS VPN security
Behringer, Michael H.
Indianapolis, Ind. : Cisco ; London : Pearson Education [distributor], 2005.
available online
Save to My List
Full Record
More Resources
61315586
23
2017
Zabbix : enterprise network montioring [sic] made easy : learn how to gather detailed statistics and
Olups, Rihards, author.
Birmingham, UK : Packt Publishing, 2017.
available online
Save to My List
Full Record
More Resources
974372962
Computer networks -- Security measures -- Software -- Fiction.
24
2022
INVESTMENTS UNLIMITED a novel about DevOps, security, audit compliance, and thriving in the digital
Beal, Helen, author.
Portland, OR : IT REVOLUTION, 2022.
available online
Save to My List
Full Record
More Resources
Computer networks -- Security measures -- Standards.
25
2008
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and
Mehan, Julie E.
Ely, UK : IT Governance, 2008.
available online
Save to My List
Full Record
More Resources
652389822
26
2012
Security automation essentials : streamlined enterprise security management & monitoring with SCAP
Witte, Greg.
New York : McGraw-Hill, [2012]
available online
Save to My List
Full Record
More Resources
811552094
27
2009
Security in a Web 2.0+ world : a standards based approach
Solari, C. (Carlos)
Chichester, West Sussex : Wiley, 2009.
available online
Save to My List
Full Record
More Resources
608494199
Computer networks -- Security measures -- Study guides.
28
2021
CCSP for dummies
Deane, Arthur J., author.
Hoboken, New Jersey : John Wiley & Sons, [2021]
Location
Call No.
Status
95th Street Adult Nonfiction
004.6782 CCS 2021
DUE 05-06-24
Nichols Adult Nonfiction
004.6782 CCS 2021
DUE 04-29-24
Save to My List
Full Record
Place a hold
More Resources
sky302111586
29
2023
Certified ethical hacker boot camp.
[Place of publication not identified] : Manning Publications, 2023.
available online
Save to My List
Full Record
More Resources
Computer networks -- Security measures -- Testing.
30
2008
Build your own security lab : a field guide for network testing
Gregg, Michael (Michael C.)
Indianapolis, IN : Wiley, ©2008.
available online
Save to My List
Full Record
More Resources
647764570
31
2012
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits
Tiller, James S.
Boca Raton, FL : CRC Press, ©2012.
available online
Save to My List
Full Record
More Resources
772692279
32
2012
Coding for penetration testers : building better tools
Andress, Jason.
Waltham, Mass. : Syngress, ©2012.
available online
Save to My List
Full Record
More Resources
801987766
33
2016
Coding for penetration testers : building better tools
Andress, Jason, author.
Rockland : Syngress, 2016.
available online
Save to My List
Full Record
More Resources
962414155
34
2014
Cybersecurity : managing systems, conducting testing, and investigating intrusions
Mowbray, Thomas J., author.
Indianapolis, IN : Wiley, [2014]
available online
Save to My List
Full Record
More Resources
35
2012
Metasploit : Das Handbuch zum Penetration-Testing-Framework.
Messner, Michael.
dpunkt.verlag, 2012.
available online
Save to My List
Full Record
More Resources
798535932
36
2012
Metasploit Penetration Testing Cookbook.
Singh, Abhinav.
Birmingham : Packt Publishing, 2012.
available online
Save to My List
Full Record
More Resources
798535898
37
2018
Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex e
Teixeira, Daniel, author.
Birmingham, UK : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
38
2011
Metasploit : the penetration tester's guide
San Francisco, CA : No Starch Press, 2011.
available online
Save to My List
Full Record
More Resources
754641929
39
2011
Penetration tester's open source toolkit
Faircloth, Jeremy.
Waltham, MA : Syngress, ©2011.
available online
Save to My List
Full Record
More Resources
748289116
40
2019
Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploit
Rahalkar, Sagar, author.
[Place of publication not identified] : Apress, [2019]
available online
Save to My List
Full Record
More Resources
Computer networks -- Security measures -- United States.
41
2023
Battlefield cyber : how China and Russia are undermining our democracy and national security
Holstein, William J., author.
Lanham, Maryland : Prometheus Books, [2023]
Location
Call No.
Status
95th Street Adult Nonfiction-NEW
363.325 HOL
DUE 05-16-24
Nichols Adult Nonfiction-NEW
363.325 HOL
DUE 05-24-24
Save to My List
Full Record
Place a hold
More Resources
sky308034792
42
2022
Breached! : why data security law fails and how to improve it
Solove, Daniel J., 1972- author.
[Prince Frederick, Maryland] : Recorded Books, 2022.
available online
Save to My List
Full Record
More Resources
43
2014
Carry on : sound advice from Schneier on security
Schneier, Bruce, 1963- author.
Indianapolis, IN : John Wiley & Sons, Inc., [2014]
available online
Save to My List
Full Record
More Resources
44
2011
Cyberdeterrence and cyberwar
Libicki, Martin C.
[United States] : Blackstone Publishing, 2011.
available online
More...
Save to My List
Full Record
More Resources
45
2016
Cybersecurity and cyberwar : what everyone needs to know
Singer, P. W. (Peter Warren), author.
[United States] : Tantor Audio, 2016.
available online
More...
Save to My List
Full Record
More Resources
46
2017
Defensive security handbook : best practices for securing infrastructure
Brotherston, Lee, author.
Sebastopol, CA : O'Reilly Media, 2017.
available online
Save to My List
Full Record
More Resources
981765043
47
2021
Aan quan fang yu ru men shou ce = Defensive security handbook
Brotherston, Lee, author.
Beijing ; Boston : O'Reilly Media ; Beijing : Ren min you dian chu ban she, 2021.
available online
Save to My List
Full Record
More Resources
48
2013
FISMA and the risk management framework : the new practice of federal cyber security
Boston : Syngress, 2013.
available online
Save to My List
Full Record
More Resources
819506980
49
2020
Schneier on security
Schneier, Bruce, 1963-
[United States] : Recorded Books, Inc., 2020.
available online
More...
Save to My List
Full Record
More Resources
50
2008
Schneier on security
Schneier, Bruce, 1963-
Indianapolis, IN : Wiley Pub., ©2008.
available online
Save to My List
Full Record
More Resources
401339204
locate in results
More Information
Find another book like this
Computer networks -- Security measures. http://id
at
Novelist
Result Page
1
2
3
4
5
6
7
8
9
10
11
...
13
next
Return to Browse
Search: