skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Index

Results 1 - 50 of 68  for Library Catalog (Excludes Articles)

Results 1 2 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Insider threat : a guide to understanding, detecting, and defending against the enemy from within
Material Type:
Book
Add to e-Shelf

Insider threat : a guide to understanding, detecting, and defending against the enemy from within

Julie E. Mehan author.

2016

Online access

2
You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches
Material Type:
Book
Add to e-Shelf

You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches

Josephine Wolff author.

2018

Online access

3
Material Type:
Book
Add to e-Shelf

Cyberterrorism how real is the threat?

Gabriel Weimann 1950- United States Institute of Peace.

2004

Online access

4
Cyber fraud : tactics, techniques, and procedures
Material Type:
Book
Add to e-Shelf

Cyber fraud : tactics, techniques, and procedures

James Graham; Rick Howard

c2009

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .H69 2009 )()

5
Zen and the art of information security
Material Type:
Book
Add to e-Shelf

Zen and the art of information security

Ira. Winkler

c2007

Online access

6
Combating security breaches and criminal activity in the digital sphere
Material Type:
Book
Add to e-Shelf

Combating security breaches and criminal activity in the digital sphere

S. Geetha author. Asnath Victy Phamila author.

2016

Online access

7
Fighting computer crime : a new framework for protecting information
Material Type:
Book
Add to e-Shelf

Fighting computer crime : a new framework for protecting information

Donn B. Parker

c1998

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .P374 1998 )()

8
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
Material Type:
Book
Add to e-Shelf

The basics of hacking and penetration testing : ethical hacking and penetration testing made easy

Pat Engebretson (Patrick Henry), 1974- James Broad

c2011

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 E5443 2011 )()

View 3 versions
9
Cyber terrorism : a guide for facility managers
Material Type:
Book
Add to e-Shelf

Cyber terrorism : a guide for facility managers

Joseph F. Gustin 1947-

c2004

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .G87 2004 )()

10
The science of cybersecurity and a roadmap to research
Material Type:
Book
Add to e-Shelf

The science of cybersecurity and a roadmap to research

Benjamin J Colfer

2011

Online access

11
Cybercrime among companies : research into cybercrime victimisation among small- and medium-sized enterprises and one-man businesses in the Netherlands
Material Type:
Book
Add to e-Shelf

Cybercrime among companies : research into cybercrime victimisation among small- and medium-sized enterprises and one-man businesses in the Netherlands

Sander Veenstra author. Renske Zuurveen author.; W. Ph Stol (Wouter Ph.), author.

2016

Online access

12
Material Type:
Book
Add to e-Shelf

High-tech crimes revealed : cyberwar stories from the digital front

Steven Branigan

2005

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .B735 2005 )()

13
Superhighway robbery preventing e-commerce crime
Material Type:
Book
Add to e-Shelf

Superhighway robbery preventing e-commerce crime

Graeme R. Newman R. V. G Clarke

2003

Online access

14
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger
Material Type:
Book
Add to e-Shelf

Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger

Julie E. Mehan

2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .M44 2008 )()

View 2 versions
15
Penetration testing essentials
Material Type:
Book
Add to e-Shelf

Penetration testing essentials

Sean-Philip Oriyano author.

First edition.. 2017

Online access

16
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography
Material Type:
Book
Add to e-Shelf

Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography

Roger Dube

c2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 D8152 2008 )()

17
H4ckers5 wanted : an examination of the cybersecurity labor market
Material Type:
Book
Add to e-Shelf

H4ckers5 wanted : an examination of the cybersecurity labor market

Martin C. Libicki author. David Senty author.; Julia Pollak author.; Dori Walker cover designer.; Rand Corporation. National Security Research Division, sponsor.

2014

Online access

18
Web application defender's cookbook battling hackers and protecting users
Material Type:
Book
Add to e-Shelf

Web application defender's cookbook battling hackers and protecting users

Ryan C. Barnett

1st ed.. 2013

Online access

19
Net crimes & misdemeanors : outmaneuvering web spammers, stalkers, and con artists
Material Type:
Book
Add to e-Shelf

Net crimes & misdemeanors : outmaneuvering web spammers, stalkers, and con artists

Hitchcock, Jayne A Author Page, Loraine Contributor

2006

Online access

20
Cyber security culture counteracting cyber threats through organizational learning and training
Material Type:
Book
Add to e-Shelf

Cyber security culture counteracting cyber threats through organizational learning and training

Peter R. J. Trim David Upton

c2013

Online access

21
Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities
Material Type:
Book
Add to e-Shelf

Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities

T. Gunasekhar 1990- author.

2019

Online access

22
Policing the Internet
Material Type:
Book
Add to e-Shelf

Policing the Internet

Daniels, Peggy Contributor

2007

Online access

23
IT security metrics : a practical framework for measuring security & protecting data
Material Type:
Book
Add to e-Shelf

IT security metrics : a practical framework for measuring security & protecting data

Lance Hayden

c2010

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 H392 2010 )()

24
Countering cyber attacks and preserving the integrity and availability of critical systems
Material Type:
Book
Add to e-Shelf

Countering cyber attacks and preserving the integrity and availability of critical systems

S. Geetha 1979- author. Asnath Victy Phamila 1978- author.

2019

Online access

25
Introduction to cybercrime : computer crimes, laws, and policing in the 21st century
Material Type:
Book
Add to e-Shelf

Introduction to cybercrime : computer crimes, laws, and policing in the 21st century

Joshua B. Hill author. Nancy E. Marion author.

2016

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .H554 2016 )()

26
Network attacks & exploitation : a framework
Material Type:
Book
Add to e-Shelf

Network attacks & exploitation : a framework

Matthew Monte author.

2015

Online access

27
2010 second Cybercrime and Trustworthy Computing Workshop : 19-20 July 2010.
Material Type:
Book
Add to e-Shelf

2010 second Cybercrime and Trustworthy Computing Workshop : 19-20 July 2010.

Cybercrime and Trustworthy Computing Workshop (2nd : 2010 : Ballarat, Vic.)

2010

Online access

28
8th IET International System Safety Conference incorporating the Cyber Security Conference 2013 : 16-17 October 2013.
Material Type:
Book
Add to e-Shelf

8th IET International System Safety Conference incorporating the Cyber Security Conference 2013 : 16-17 October 2013.

2014

Online access

29
Cyberspies : the secret history of surveillance, hacking, and digital espionage
Material Type:
Book
Add to e-Shelf

Cyberspies : the secret history of surveillance, hacking, and digital espionage

Gordon Corera author.

First Pegasus Books hardcover edition.. 2016

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .C66 2016 )()

30
At the nexus of cybersecurity and public policy : some basic concepts and issues
Material Type:
Book
Add to e-Shelf

At the nexus of cybersecurity and public policy : some basic concepts and issues

David Clark editor.; Thomas Berson editor.; Herbert S. Lin editor.; National Research Council (U.S.). Computer Science and Telecommunications Board. Committee on Developing a Cybersecurity Primer, originator.

2014

Online access

31
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI
Material Type:
Book
Add to e-Shelf

Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI

Debra S. Herrmann

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5102.85 .H4685 2007 )()

32
Emerging trends in ICT security
Material Type:
Book
Add to e-Shelf

Emerging trends in ICT security

Babak Akhgar; Hamid Arabnia

2014

Online access

33
Knowledge discovery in cyberspace : statistical analysis and predictive modeling
Material Type:
Book
Add to e-Shelf

Knowledge discovery in cyberspace : statistical analysis and predictive modeling

Kristijan Kuk editor.; Dragan Ranđelović editor.

2017

Online access

34
Security solutions for hyperconnectivity and the internet of things
Material Type:
Book
Add to e-Shelf

Security solutions for hyperconnectivity and the internet of things

Maurice Dawson 1982- author. Mohamed Eltayeb 1978- author.; Marwan Omar 1982- author.

2017

Online access

35
Cyberspace and cybersecurity
Material Type:
Book
Add to e-Shelf

Cyberspace and cybersecurity

George K. Kostopoulos author.

Second edition.. 2018

Online access

36
Cyber security : threats and responses for government and business
Material Type:
Book
Add to e-Shelf

Cyber security : threats and responses for government and business

Jack Caravelli 1952- author. Nigel Jones 1965- author.

2019

Online access

37
Cybersecurity public sector threats and responses
Material Type:
Book
Add to e-Shelf

Cybersecurity public sector threats and responses

Kim J Andreasson

2012

Online access

38
Cyber attack
Material Type:
Book
Add to e-Shelf

Cyber attack

Marty Gitlin author. Margaret J. Goldstein author.

2015

Online access

39
Internet searches for vetting, investigations, and open-source intelligence
Material Type:
Book
Add to e-Shelf

Internet searches for vetting, investigations, and open-source intelligence

Edward J. Appel

2011

Online access

40
Material Type:
Journal
Add to e-Shelf

... Workshop on Socio-technical Aspects in Security and Trust : STAST ...

Workshop on Socio-technical Aspects in Security and Trust. Institute of Electrical and Electronics Engineers.

2011]-

Online access

41
The hacker playbook : practical guide to penetration testing
Material Type:
Book
Add to e-Shelf

The hacker playbook : practical guide to penetration testing

Peter Kim

2014

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 K56 2014 )()

42
The global cybercrime industry : economic, institutional and strategic perspectives
Material Type:
Book
Add to e-Shelf

The global cybercrime industry : economic, institutional and strategic perspectives

Nir Kshetri

c2010

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .K77 2010 )()

43
Internet freedom software and illicit activity : supporting human rights without enabling criminals
Material Type:
Book
Add to e-Shelf

Internet freedom software and illicit activity : supporting human rights without enabling criminals

National Defense Research Institute (U.S.), author. Sasha Romanosky author.

2015

Online access

44
Cybercrime and cyberwarfare
Material Type:
Book
Add to e-Shelf

Cybercrime and cyberwarfare

Igor. Bernik

2014

Online access

45
Hacking web apps detecting and preventing web application security problems
Material Type:
Book
Add to e-Shelf

Hacking web apps detecting and preventing web application security problems

Mike. Shema Jorge Blanco Alcover

2012

Online access

46
Risk revolution : the threats facing America & technology's promise for a safer tomorrow
Material Type:
Book
Add to e-Shelf

Risk revolution : the threats facing America & technology's promise for a safer tomorrow

Derek V. Smith ChoicePoint (Firm)

2004

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 7431 .S65 2004 )()

47
Cyber warfare : how conflicts in cyberspace are challenging America and changing the world
Material Type:
Book
Add to e-Shelf

Cyber warfare : how conflicts in cyberspace are challenging America and changing the world

Paul Rosenzweig 1959-

c2013

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (U 163 .R68 2013 )()

48
An introduction to hacking and crimeware a pocket guide
Material Type:
Book
Add to e-Shelf

An introduction to hacking and crimeware a pocket guide

Victoria. Loewengart

2012

Online access

49
Cyber Terrorism: A Guide for Facility Managers
Material Type:
Book
Add to e-Shelf

Cyber Terrorism: A Guide for Facility Managers

Gustin, Joseph F Author

2004

Online access

50
Policing the internet
Material Type:
Book
Add to e-Shelf

Policing the internet

Espejo, Roman Contributor

2012

Online access