Classify

An experimental classification web service

Powered by the Classify Web Service.

Search Results

Search Criteria: FAST heading = Information technology--Security measures
Displaying 1 to 25 of 1692
Title & Author Format Holdings Editions From To
Computer and information security handbook by Vacca, John R.
DDC/LCC
  4605 68 2009 2017
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy by Engebretson, Pat (Patrick Henry), 1974-
DDC/LCC
  2592 64 2010 2017
Hack proofing your network : internet tradecraft by Russell, Ryan, 1969-
DDC/LCC
  2450 43 2000 2002
Selling information security to the Board : a primer by Calder, Alan, 1957-
DDC/LCC
  2397 16 2010 2016
Google hacking for penetration testers by Long, Johnny
DDC/LCC
  2381 64 2004 2016
Information security breaches : avoidance and treatment based on ISO27001 by Krausz, Michael
DDC/LCC
  2377 20 2009 2014
Once more unto the breach : managing information security in an uncertain world by Simmons, Andrea C.
DDC/LCC
  2368 25 2012 2015
Network security assessment : from vulnerability to patch by Manzuik, Steve
DDC/LCC
  2325 26 2006 2009
Assessing information security : strategies, tactics, logic and framework by Vladimirov, Andrew A.
DDC/LCC
  2296 25 2010 2015
The art of deception : controlling the human element of security by Mitnick, Kevin D. (Kevin David), 1963-
DDC/LCC
  2283 29 2001 2015
Strategic security management : a risk assessment guide for decision makers by Vellani, Karim H., 1971-
DDC/LCC
  2275 28 2006 2021
The silicon jungle : a novel of deception, power, and internet intrigue by Baluja, Shumeet, 1971-
DDC/LCC
  2241 22 2011 2015
Nessus, Snort, & Ethereal power tools : customizing open source security applications by Archibald, Neil
DDC/LCC
  2227 26 2005 2014
When bad grammar happens to good people : how to avoid common errors in English by Batko, Ann
DDC/LCC
  2206 20 2004 2017
The best damn cybercrime and digital forensics book period by Wiles, Jack
DDC/LCC
  2120 19 2007 2011
Managing information security breaches : studies from real life by Krausz, Michael
DDC/LCC
  2089 19 2010 2015
Business continuity and disaster recovery planning for it professionals by Snedaker, Susan
DDC/LCC
  2062 35 2007 2014
Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux by Buchanan, Cameron
DDC/LCC
  2059 22 2015 2018
Cyber spying : tracking your family's (sometimes) secret online lives by Fair, Ted
DDC/LCC
  2046 15 2005 2009
Security assessment : case studies for implementing the NSA IAM by Rogers, Russ
DDC/LCC
  2033 18 2004 2004
How to cheat at managing information security by Osborne, Mark, 1970-
DDC/LCC
  2021 20 2006 2014
Professional issues in information technology by Bott, Frank
DDC/LCC/NLM
  2016 35 2005 2017
Open source fuzzing tools by Rathaus, Noam
DDC/LCC
  2012 25 2007 2011
The basics of digital forensics : the primer for getting started in digital forensics by Sammons, John
DDC/LCC
  2002 48 2011 2015
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures by Contos, Brian T.
DDC/LCC
  1992 21 2006 2012
Displaying 1 to 25 of 1692
.