Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
More Resources
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
Result Page
1
2
next
Add All On Page to My List
Subjects (1-50 of 86)
Computers -- Access control.
1
2011
AAA identity management security
Santuka, Vivek.
Indianapolis, IN : Cisco Press, ©2011.
available online
Save to My List
Full Record
More Resources
699720264
2
2021
ASP.NET core identity : authentication and authorization.
[Place of publication not identified] : Packt Publishing, 2021.
available online
Save to My List
Full Record
More Resources
3
2022
ASP.NET core identity : user security essentials.
[Place of publication not identified] : Manning Publications, 2022.
available online
Save to My List
Full Record
More Resources
4
2014
The basics of digital privacy : simple tools to protect your personal information and your identity
Cherry, Denny.
Waltham, Massachusetts : Syngress, ©2014.
available online
Save to My List
Full Record
More Resources
865332007
5
2019
Becoming the hacker : the playbook for getting inside the mind of an attacker
Pruteanu, Adrian, author.
Birmingham, UK : Packt Publishing, 2019.
available online
Save to My List
Full Record
More Resources
6
2016
Building a pentesting lab for wireless networks : build your own secure enterprise or home penetrati
Fadyushin, Vyacheslav, author.
Birmingham, UK : Packt Publishing, 2016.
available online
Save to My List
Full Record
More Resources
946596199
7
2016
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtu
Cardwell, Kevin, author.
Birmingham : Packt Publishing, [2016].
available online
Save to My List
Full Record
More Resources
959427608
8
2014
Cisco bring your own device (BYOD) networking
Redmon, Kevin.
[Place of publication not identified] : Cisco Press, 2014.
available online
Save to My List
Full Record
More Resources
883128075
9
2007
Cisco NAC appliance : enforcing host security with clean access
Heary, Jamey.
Indianapolis, Ind. : Cisco Press, 2007.
available online
Save to My List
Full Record
More Resources
172622796
10
2005
Cisco Security Agent
Sullivan, Chad.
Indianapolis, Ind. : Cisco ; London : Pearson Education [distributor], 2005.
available online
Save to My List
Full Record
More Resources
61315480
11
2023
Cloud identity patterns and strategies for enterprise
Di Federico, Giuseppe, author.
[Place of publication not identified] : Packt Publishing, 2023.
available online
Save to My List
Full Record
More Resources
12
2005
Computer privacy annoyances : how to avoid the most ANNOYING invasions of your personal and online p
Tynan, Dan.
Sebastopol, Calif. ; Farnham : O'Reilly, ©2005.
available online
Save to My List
Full Record
More Resources
607783938
13
2010
Designing an IAM framework with Oracle Identity and access management suite
Scheidel, Jeff.
New York : McGraw-Hill, ©2010.
available online
Save to My List
Full Record
More Resources
665815680
14
2019
Developing applications with Azure active directory : principles of authentication and authorization
Mayank, Manas, author.
[Berkeley, California] : Apress, [2019]
Location
Call No.
Status
95th Street Adult Nonfiction
006.7882 AZU 2019
DUE 06-01-24
Nichols Adult Nonfiction
006.7882 AZU 2019
DUE 06-04-24
Save to My List
Full Record
Place a hold
More Resources
15
2013
Federated identity primer
Rountree, Derrick.
[Place of publication not identified] : Syngress, ©2013.
available online
Save to My List
Full Record
More Resources
821045458
16
2015
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible version
Santacroce, Ferdinando, author.
Birmingham, UK : Packt Publishing, 2015.
available online
Save to My List
Full Record
More Resources
910165628
17
2017
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible version
Santacroce, Ferdinando, author.
Birmingham, UK : Packt Publishing, 2017.
available online
Save to My List
Full Record
More Resources
18
2017
Git essentials LiveLessons
Chen, Daniel Y.
[Place of publication not identified] : Addison-Wesley : Pearson, [2017]
available online
Save to My List
Full Record
More Resources
959736189
19
2016
Git : mastering version control
Santacroce, Ferdinando, author.
Birmingham, UK : Packt Publishing, 2016.
available online
Save to My List
Full Record
More Resources
965915877
20
2022
Git Schnelleinstieg : Versionsverwaltung lernen in 14 Tagen : einfach und ohne Vorkenntnisse
Vijayakumaran, Sujeevan, author.
[Place of publication not identified] : mitp Verlag, 2022.
available online
Save to My List
Full Record
More Resources
21
2014
Gitolite essentials : leverage powerful branch and user access control with Git for your own private
Chamarty, Sitaram.
Birmingham, U.K. : Packt Pub., ©2014.
available online
Save to My List
Full Record
More Resources
879332992
22
2021
Hacking multifactor authentication
Grimes, Roger A., author.
Indianapolis, IN : Wiley, [2021]
Location
Call No.
Status
Naper Blvd. Adult Nonfiction
005.8 GRI 2021
DUE 05-20-24
Save to My List
Full Record
Place a hold
More Resources
23
2018
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tool
Bramwell, Phil, author.
Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
available online
Save to My List
Full Record
More Resources
24
2003-
How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN.
Barken, Lee, author.
E Rutherford : Prentice Hall PTR Aug. 2003 Old Tappan : Pearson Education [distributor]
available online
Save to My List
Full Record
More Resources
697663932
25
2014
Identity and access management : business performance through connected intelligence
Osmanoglu, T. Ertem.
Waltham, MA : Syngress, ©2014.
available online
Save to My List
Full Record
More Resources
870339997
26
2022
Identity patterns and strategies for enterprise design enterprise cloud identity model with Oauth 2.
Federico, Giuseppe Di, author.
Birmingham : Packt Publishing, 2023.
available online
Save to My List
Full Record
More Resources
27
2023
IMPLEMENTING MULTIFACTOR AUTHENTICATION protect your applications from cyberattacks with the help of
FANTI, MARCO.
Birmingham, UK : PACKT PUBLISHING LIMITED, 2023.
available online
Save to My List
Full Record
More Resources
28
2016
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standa
Williams, Barry L.
Auerbach Publications, 2016.
available online
Save to My List
Full Record
More Resources
990193978
29
2008
Infosecurity 2008 threat analysis
Burlington, MA : Syngress Pub., ©2008.
available online
Save to My List
Full Record
More Resources
281598632
30
2007
Integrated Security Systems Design : Concepts, Specifications, and Implementation.
Norman, Thomas L.
Burlington : Elsevier, 2007.
available online
Save to My List
Full Record
More Resources
437176881
31
2014
Intrusion detection networks : a key to collaborative security
Fung, Carol, author.
Boca Raton : CRC Press, Taylor & Francis Group, [2014]
available online
Save to My List
Full Record
More Resources
865006746
32
2003
Intrusion detection with Snort
Koziol, Jack.
Indianapolis, Ind. : Sams, ©2003.
available online
Save to My List
Full Record
More Resources
59788132
33
2010
Junos Security.
Cameron, Rob.
Sebastopol : O'Reilly Media, Inc., 2010.
available online
Save to My List
Full Record
More Resources
780425286
34
2016
Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in
Johansen, Gerard, author.
Birmingham, UK : Packt Publishing, 2016.
available online
Save to My List
Full Record
More Resources
960471400
35
2016
Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating
Halton, Wolf, author.
Birmingham, UK : Packt Publishing, 2016.
available online
Save to My List
Full Record
More Resources
953616441
36
2017
Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
Sharma, Himanshu, author.
Birmingham, UK : Packt Publishing, 2017.
available online
Save to My List
Full Record
More Resources
37
2019
Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and t
Sharma, Himanshu, author.
Birmingham, UK : Packt Publishing, 2019.
available online
Save to My List
Full Record
More Resources
38
2017
Kali Linux cookbook : effective penetration testing solutions
Schultz, Corey P., author.
Birmingham, UK : Packt Publishing, 2017.
available online
Save to My List
Full Record
More Resources
39
2017
Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps
Shah, Dhruv, author.
Birmingham, UK : Packt Publishing, 2017.
available online
Save to My List
Full Record
More Resources
987379344
40
2017
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
Hixon, Michael, author.
Birmingham, UK : Packt Publishing, 2017.
available online
Save to My List
Full Record
More Resources
990194773
41
2018
Kali Linux tutorial for beginners
Naja, Tarek, speaker.
[Place of publication not identified] : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
42
2017
Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to s
Buchanan, Cameron, author.
Birmingham, UK : Packt Publishing, 2017.
available online
Save to My List
Full Record
More Resources
43
2018
Learn Git in 3 hours
Conyers, Ross, speaker.
[Place of publication not identified] : Packt, [2018]
available online
Save to My List
Full Record
More Resources
44
2007
Linux firewalls
Rash, Michael.
San Francisco : No Starch Press, 2007.
available online
Save to My List
Full Record
More Resources
192096519
45
2015
Linux firewalls : enhancing security with nftables and beyond
Suehring, Steve, author.
Upper Saddle River, NJ : Addison-Wesley, [2015]
available online
Save to My List
Full Record
More Resources
902880373
46
2011
Managed code rootkits : hooking into runtime environments
Metula, Erez.
Amsterdam ; Boston : Syngress, ©2011.
available online
Save to My List
Full Record
More Resources
689007482
47
2004
Managing security with Snort and IDS tools
Cox, Kerry.
Beijing ; Cambridge : O'Reilly, ©2004.
available online
Save to My List
Full Record
More Resources
729550077
48
2019
Managing SQL Server encryption certificates : getting started with SQL Server encryption
Blinn, Eric, speaker.
[Place of publication not identified] : Apress, 2019.
available online
Save to My List
Full Record
More Resources
49
2020
Mastering Metasploit - Fourth Edition
Jaswal, Nipun.
[S.l.] : Packt Publishing, 2020.
available online
Save to My List
Full Record
More Resources
50
2016
Mastering Metasploit : take your penetration testing and IT security skills to a whole new level wit
Jaswal, Nipun.
Birmingham : Packt Publishing, 2016.
available online
Save to My List
Full Record
More Resources
960040596
locate in results
More Information
Find another book like this
Computer vision.
at
Novelist
Result Page
1
2
next
Return to Browse
Search: