Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
More Resources
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
Result Page
1
2
3
4
5
next
Add All On Page to My List
Subjects (1-50 of 248)
Data protection.
1
2014
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
Bachrach, Daniel G., author.
Berkeley, CA : Apress, [2014]
available online
Save to My List
Full Record
More Resources
894509205
2
2020
Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your
Norberg, Scott, author.
Berkeley, CA : Apress, 2020.
available online
Save to My List
Full Record
More Resources
3
2022
Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
Borges, Dan, author.
[Birmingham, UK] : Packt Publishing, 2022.
available online
Save to My List
Full Record
More Resources
4
2016
Analyzing and securing social networks
Thuraisingham, Bhavani M., author.
Boca Raton : Auerbach, 2016.
available online
Save to My List
Full Record
More Resources
988947732
5
2011
Analyzing computer security : a threat/vulnerability/countermeasure approach
Pfleeger, Charles P., 1948-
Upper Saddle River, NJ : Prentice Hall, [2011], ©2012.
available online
Save to My List
Full Record
More Resources
741517502
6
2014
Anonymous Communication Networks
Peng, Kun, author.
[Place of publication not identified] : Auerbach Publications, 2014.
available online
Save to My List
Full Record
More Resources
7
2014
Anti-hacker tool kit.
Shema, Mike, author.
New York : McGraw-Hill Education, 2014.
available online
Save to My List
Full Record
More Resources
882259135
8
2009
The Antideficiency Act Answer Book
Arnold, William, author.
Berrett-Koehler Publishers, 2009.
available online
Save to My List
Full Record
More Resources
9
2015
Application of big data for national security : a practitioner's guide to emerging technologies
Oxford, UK : Butterworth-Heinemann, an imprint of Elsevier Ltd., [2015]
available online
Save to My List
Full Record
More Resources
903531520
10
2017
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Bi
Mitnick, Kevin D. (Kevin David), 1963- author.
New York : Little, Brown and Company, 2017.
Location
Call No.
Status
95th Street Adult Nonfiction
005.8 MIT 2017
DUE 04-02-24
Naper Blvd. Adult Nonfiction
005.8 MIT 2017
DUE 05-23-24
Save to My List
Full Record
Place a hold
More Resources
11
2017
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Bi
Mitnick, Kevin D. (Kevin David), 1963- author.
New York : Little, Brown and Company, 2017.
available online
Save to My List
Full Record
More Resources
12
2022
ASP.NET Core Security
Wenz, Christian, author.
Shelter Island, NY : Manning Publications, 2022.
available online
Save to My List
Full Record
More Resources
13
2004
Assessing and Managing Security Risk in IT Systems
McCumber, John.
[S.l.] : Auerbach Publications, 2004.
available online
Save to My List
Full Record
More Resources
14
2011
Auditing cloud computing : a security and privacy guide
Hoboken, N.J. : John Wiley & Sons, ©2011.
available online
Save to My List
Full Record
More Resources
747412460
15
2001
Backing up Oracle : using Tivoli Storage Management
San Jose, Calif. : IBM, International Technical Support Organization, 2001.
available online
Save to My List
Full Record
More Resources
55235041
16
2013
Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks
Drabick, Rodger, author.
Addison-Wesley Professional, 2013.
available online
Save to My List
Full Record
More Resources
17
2021
Big breaches : cybersecurity lessons for everyone
Daswani, Neil, author.
[Berkeley] : Apress, [2021]
available online
Save to My List
Full Record
More Resources
18
2018
The Board's Role in Managing Cybersecurity Risks
Rothrock, Ray, author.
MIT Sloan Management Review, 2018.
available online
Save to My List
Full Record
More Resources
19
2005
Building a global information assurance program
Curts, Raymond J., author.
Boca Raton, FL : Auerbach Publications, [2005]
available online
Save to My List
Full Record
More Resources
20
2002
Building an information security awareness program
Desman, Mark B.
Boca Raton : Auerbach Publications, ©2002.
available online
Save to My List
Full Record
More Resources
61071178
21
2021
Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable sy
Adkins, Heather, author.
Beijing : Ren min you dian chu ban she, 2021.
available online
Save to My List
Full Record
More Resources
22
2023
Sekyua de shinraisei no aru shisutemu kōchiku : Google SRE ga kangaeru anzen na shisutemu no sekkei,
Adkins, Heather, author.
Tōkyō-to Shinjuku-ku : Orairī Japan, 2023.
available online
Save to My List
Full Record
More Resources
23
2020
Building secure firmware : armoring the foundation of the platform
Yao, Jiewen.
[United States] : Apress, 2020.
available online
Save to My List
Full Record
More Resources
24
2005
The business case for network security : advocacy, governance, and ROI
Paquet, Catherine.
Indianapolis, Ind. : Cisco Press, ©2005.
available online
Save to My List
Full Record
More Resources
59670192
25
2008
Business continuity planning for data centers and systems : a strategic implementation guide
Bowman, Ronald H., 1960-
Hoboken, N.J. : John Wiley & Sons, ©2008.
available online
Save to My List
Full Record
More Resources
608624000
26
2002
Business plans handbook. a compilation of actual business plans developed by small businesses throug
Detroit, Mich. : Gale, 2002.
available online
Save to My List
Full Record
More Resources
27
2012
The CERT guide to insider threats : how to prevent, detect, and respond to information technology cr
Cappelli, Dawn.
Upper Saddle River, NJ : Addison-Wesley, ©2012.
available online
Save to My List
Full Record
More Resources
785648259
28
2011
The chief information security officer : insights, tools and survival skills
Kouns, Barry.
Ely : IT Governance Pub., 2011.
available online
Save to My List
Full Record
More Resources
726735460
29
2007
CISA Exam Prep
Gregg, Michael (Michael C.), author.
Pearson IT Certification, 2007.
available online
Save to My List
Full Record
More Resources
30
2016
The CISO Handbook
Gentile, Michael, author.
Auerbach Publications, 2016.
available online
Save to My List
Full Record
More Resources
31
2023
The CISO perspective : understand the importance of the CISO in the cyber threat landscape
Kouns, Barry L., author.
Ely, Cambridgeshire : IT Governance Publishing, 2023.
available online
Save to My List
Full Record
More Resources
32
2013
CISSP Cert Guide
McMillan, Troy, author.
Pearson IT Certification, 2013.
available online
Save to My List
Full Record
More Resources
33
2016
CISSP Cert Guide, Second Edition
Abernathy, Robin M., author.
Pearson IT Certification, 2016.
available online
Save to My List
Full Record
More Resources
34
2009
CISSP Exam Cram, Second Edition
Gregg, Michael (Michael C.), author.
Pearson IT Certification, 2009.
available online
Save to My List
Full Record
More Resources
35
2012
CISSP Exam Cram, Third Edition
Gregg, Michael (Michael C.), author.
Pearson IT Certification, 2012.
available online
Save to My List
Full Record
More Resources
36
2016
CISSP Practice Questions Exam Cram, Fourth Edition
Gregg, Michael (Michael C.), author.
Pearson IT Certification, 2016.
available online
Save to My List
Full Record
More Resources
37
2008
CISSP Practice Questions Exam Cram, Second Edition
Gregg, Michael (Michael C.), author.
Pearson IT Certification, 2008.
available online
Save to My List
Full Record
More Resources
38
2012
CISSP Practice Questions Exam Cram, Third Edition
Gregg, Michael, author.
Pearson IT Certification, 2012.
available online
Save to My List
Full Record
More Resources
39
2020
Cloud Computing Security, 2nd Edition
Vacca, John, author.
CRC Press, 2020.
available online
Save to My List
Full Record
More Resources
40
2017
Cloud computing security : foundations and challenges
Boca Raton : CRC Press, [2017]
available online
Save to My List
Full Record
More Resources
959277888
41
2015
The cloud security ecosystem : technical, legal, business and management issues
Waltham, MA : Syngress, [2015]
available online
Save to My List
Full Record
More Resources
911676578
42
2015
Cloud storage security : a practical guide
Wheeler, Aaron, author.
Waltham, MA : Elsevier, [2015]
available online
Save to My List
Full Record
More Resources
915143472
43
2011
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
Canavan, Tom.
Indianapolis, Ind. : Wiley Pub., ©2011.
available online
Save to My List
Full Record
More Resources
739838968
44
2014
Communication in a wired world : be smart, be safe.
[San Francisco, California, USA] : Kanopy Streaming, 2014.
available online
More...
Save to My List
Full Record
More Resources
45
2020
The Complete 2020 Ethereum and Solidity Developer Bootcamp
Wiesner, Thomas, author.
Packt Publishing, 2020.
available online
Save to My List
Full Record
More Resources
46
2013
The complete book of data anonymization : from planning to implementation
Raghunathan, Balaji, author.
Boca Raton : CRC Press, Taylor & Francis Group, [2013]
available online
Save to My List
Full Record
More Resources
47
2005
Computer privacy annoyances : how to avoid the most ANNOYING invasions of your personal and online p
Tynan, Dan.
Sebastopol, Calif. ; Farnham : O'Reilly, ©2005.
available online
Save to My List
Full Record
More Resources
607783938
48
2005
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
Skoudis, Ed.
Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference, 2005.
available online
Save to My List
Full Record
More Resources
123904762
49
2020
Cryptography : the key to digital security, how it works, and why it matters
Martin, Keith M., author.
[Prince Frederick] : HighBridge Audio, 2020.
available online
Save to My List
Full Record
More Resources
50
2020
Customer data + privacy : the insights you need from Harvard Business Review
Boston, Massachusetts : Harvard Business Review Press, [2020]
Location
Call No.
Status
95th Street Adult Nonfiction
005.8 CUS 2020
AVAILABLE
Save to My List
Full Record
Place a hold
More Resources
sky302108286
locate in results
More Information
Find another book like this
Data protection -- Videodiscs.
at
Novelist
Result Page
1
2
3
4
5
next
Return to Browse
Search: