skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Index

Results 1 - 50 of 58  for Library Catalog (Excludes Articles)

Results 1 2 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Insider threat : a guide to understanding, detecting, and defending against the enemy from within
Material Type:
Book
Add to e-Shelf

Insider threat : a guide to understanding, detecting, and defending against the enemy from within

Julie E. Mehan author.

2016

Online access

2
You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches
Material Type:
Book
Add to e-Shelf

You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches

Josephine Wolff author.

2018

Online access

3
Material Type:
Book
Add to e-Shelf

Cyberterrorism how real is the threat?

Gabriel Weimann 1950- United States Institute of Peace

2004

Online access

4
Cyber fraud : tactics, techniques, and procedures
Material Type:
Book
Add to e-Shelf

Cyber fraud : tactics, techniques, and procedures

James Graham; Rick Howard

c2009

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .H69 2009 )()

5
Zen and the art of information security
Material Type:
Book
Add to e-Shelf

Zen and the art of information security

Ira. Winkler

c2007

Online access

6
Combating security breaches and criminal activity in the digital sphere
Material Type:
Book
Add to e-Shelf

Combating security breaches and criminal activity in the digital sphere

S. Geetha author. Asnath Victy Phamila author.

2016

Online access

7
Fighting computer crime : a new framework for protecting information
Material Type:
Book
Add to e-Shelf

Fighting computer crime : a new framework for protecting information

Donn B. Parker

c1998

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .P374 1998 )()

8
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
Material Type:
Book
Add to e-Shelf

The basics of hacking and penetration testing : ethical hacking and penetration testing made easy

Pat Engebretson (Patrick Henry), 1974- James Broad

c2011

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 E5443 2011 )()

View 3 versions
9
Cyber terrorism : a guide for facility managers
Material Type:
Book
Add to e-Shelf

Cyber terrorism : a guide for facility managers

Joseph F. Gustin 1947-

c2004

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .G87 2004 )()

10
The science of cybersecurity and a roadmap to research
Material Type:
Book
Add to e-Shelf

The science of cybersecurity and a roadmap to research

Benjamin J Colfer

2011

Online access

11
Cybercrime among companies : research into cybercrime victimisation among small- and medium-sized enterprises and one-man businesses in the Netherlands
Material Type:
Book
Add to e-Shelf

Cybercrime among companies : research into cybercrime victimisation among small- and medium-sized enterprises and one-man businesses in the Netherlands

Sander Veenstra author. Renske Zuurveen author.; W. Ph Stol (Wouter Ph.), author.

2016

Online access

12
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger
Material Type:
Book
Add to e-Shelf

Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger

Julie E. Mehan

2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .M44 2008 )()

View 2 versions
13
Penetration testing essentials
Material Type:
Book
Add to e-Shelf

Penetration testing essentials

Sean-Philip Oriyano author.

First edition.. 2017

Online access

14
Material Type:
Journal
Add to e-Shelf

... Workshop on Socio-technical Aspects in Security and Trust : STAST ...

Workshop on Socio-technical Aspects in Security and Trust. Institute of Electrical and Electronics Engineers.

2011]-

Online access

15
Material Type:
Book
Add to e-Shelf

High-tech crimes revealed : cyberwar stories from the digital front

Steven Branigan

2005

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .B735 2005 )()

16
IT security metrics : a practical framework for measuring security & protecting data
Material Type:
Book
Add to e-Shelf

IT security metrics : a practical framework for measuring security & protecting data

Lance Hayden

c2010

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 H392 2010 )()

17
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography
Material Type:
Book
Add to e-Shelf

Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography

Roger Dube

c2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 D8152 2008 )()

18
H4ckers5 wanted : an examination of the cybersecurity labor market
Material Type:
Book
Add to e-Shelf

H4ckers5 wanted : an examination of the cybersecurity labor market

Martin C. Libicki author. David Senty author.; Julia Pollak author.; Dori Walker cover designer.; Rand Corporation. National Security Research Division, sponsor.

2014

Online access

19
Web application defender's cookbook battling hackers and protecting users
Material Type:
Book
Add to e-Shelf

Web application defender's cookbook battling hackers and protecting users

Ryan C. Barnett

1st ed.. 2013

Online access

20
Network attacks & exploitation : a framework
Material Type:
Book
Add to e-Shelf

Network attacks & exploitation : a framework

Matthew Monte author.

2015

Online access

21
Net crimes & misdemeanors : outmaneuvering web spammers, stalkers, and con artists
Material Type:
Book
Add to e-Shelf

Net crimes & misdemeanors : outmaneuvering web spammers, stalkers, and con artists

Hitchcock, Jayne A Author Page, Loraine Contributor

2006

Online access

22
Cyber security culture counteracting cyber threats through organizational learning and training
Material Type:
Book
Add to e-Shelf

Cyber security culture counteracting cyber threats through organizational learning and training

Peter R. J. Trim David Upton

c2013

Online access

23
Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities
Material Type:
Book
Add to e-Shelf

Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities

T. Gunasekhar 1990- author.

2019

Online access

24
At the nexus of cybersecurity and public policy : some basic concepts and issues
Material Type:
Book
Add to e-Shelf

At the nexus of cybersecurity and public policy : some basic concepts and issues

David Clark editor.; Thomas Berson editor.; Herbert S. Lin editor.; National Research Council (U.S.). Computer Science and Telecommunications Board. Committee on Developing a Cybersecurity Primer, originator.

2014

Online access

25
Cyberspies : the secret history of surveillance, hacking, and digital espionage
Material Type:
Book
Add to e-Shelf

Cyberspies : the secret history of surveillance, hacking, and digital espionage

Gordon Corera author.

First Pegasus Books hardcover edition.. 2016

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .C66 2016 )()

26
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI
Material Type:
Book
Add to e-Shelf

Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI

Debra S. Herrmann

c2007

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (TK 5102.85 .H4685 2007 )()

27
Emerging trends in ICT security
Material Type:
Book
Add to e-Shelf

Emerging trends in ICT security

Babak Akhgar; Hamid Arabnia

2014

Online access

28
Knowledge discovery in cyberspace : statistical analysis and predictive modeling
Material Type:
Book
Add to e-Shelf

Knowledge discovery in cyberspace : statistical analysis and predictive modeling

Kristijan Kuk editor.; Dragan Ranđelović editor.

2017

Online access

29
Security solutions for hyperconnectivity and the internet of things
Material Type:
Book
Add to e-Shelf

Security solutions for hyperconnectivity and the internet of things

Maurice Dawson 1982- author. Mohamed Eltayeb 1978- author.; Marwan Omar 1982- author.

2017

Online access

30
Cyberspace and cybersecurity
Material Type:
Book
Add to e-Shelf

Cyberspace and cybersecurity

George K. Kostopoulos author.

Second edition.. 2018

Online access

31
Cyber security : threats and responses for government and business
Material Type:
Book
Add to e-Shelf

Cyber security : threats and responses for government and business

Jack Caravelli 1952- author. Nigel Jones 1965- author.

2019

Online access

32
The hacker playbook : practical guide to penetration testing
Material Type:
Book
Add to e-Shelf

The hacker playbook : practical guide to penetration testing

Peter Kim

2014

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 K56 2014 )()

33
The global cybercrime industry : economic, institutional and strategic perspectives
Material Type:
Book
Add to e-Shelf

The global cybercrime industry : economic, institutional and strategic perspectives

Nir Kshetri

c2010

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .K77 2010 )()

34
Internet freedom software and illicit activity : supporting human rights without enabling criminals
Material Type:
Book
Add to e-Shelf

Internet freedom software and illicit activity : supporting human rights without enabling criminals

National Defense Research Institute (U.S.), author. Sasha Romanosky author.

2015

Online access

35
Cybercrime and cyberwarfare
Material Type:
Book
Add to e-Shelf

Cybercrime and cyberwarfare

Igor. Bernik

2014

Online access

36
Hacking web apps detecting and preventing web application security problems
Material Type:
Book
Add to e-Shelf

Hacking web apps detecting and preventing web application security problems

Mike. Shema Jorge Blanco Alcover

2012

Online access

37
Cyber threat! : how to manage the growing risk of cyber attacks
Material Type:
Book
Add to e-Shelf

Cyber threat! : how to manage the growing risk of cyber attacks

N. MacDonnell Ulsch 1951- author.

2014

Online access

38
An introduction to hacking and crimeware a pocket guide
Material Type:
Book
Add to e-Shelf

An introduction to hacking and crimeware a pocket guide

Victoria. Loewengart

2012

Online access

39
Cyber Terrorism: A Guide for Facility Managers
Material Type:
Book
Add to e-Shelf

Cyber Terrorism: A Guide for Facility Managers

Gustin, Joseph F Author

2004

Online access

40
Cyber warfare : how conflicts in cyberspace are challenging America and changing the world
Material Type:
Book
Add to e-Shelf

Cyber warfare : how conflicts in cyberspace are challenging America and changing the world

Paul Rosenzweig 1959-

c2013

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (U 163 .R68 2013 )()

41
Information risk and security : preventing and investigating workplace computer crime
Material Type:
Book
Add to e-Shelf

Information risk and security : preventing and investigating workplace computer crime

Edward Wilding

c2006

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .W55 2006 )()

42
Security safeguards for the computer
Material Type:
Book
Add to e-Shelf

Security safeguards for the computer

Charles F. Hemphill Robert D Hemphill

c1979

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HF 5548.2 .H4477 )()

43
Management principles for asset protection : understanding the criminal equation
Material Type:
Book
Add to e-Shelf

Management principles for asset protection : understanding the criminal equation

Philip Kropatkin Richard P Kusserow

c1986

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6691 .K7 1986 )()

44
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
Material Type:
Book
Add to e-Shelf

A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)

Dan Shoemaker author. Anne Kohnke author.; Kenneth Sigler author.

2016

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (QA 76.9 .A25 S493 2016 )()

45
Managing the human factor in information security how to win over staff and influence business managers
Material Type:
Book
Add to e-Shelf

Managing the human factor in information security how to win over staff and influence business managers

David. Lacey

c2009

Online access

46
The basics of web hacking tools and techniques to attack the Web
Material Type:
Book
Add to e-Shelf

The basics of web hacking tools and techniques to attack the Web

Joshua J. Pauli Scott White

2013

Online access

47
Cyber risks for business professionals a management guide
Material Type:
Book
Add to e-Shelf

Cyber risks for business professionals a management guide

Rupert. Kendrick

2010

Online access

48
Material Type:
Video
Add to e-Shelf

Mr. Robot. Season 1

Sam Esmail creator.; Rami Malek actor.; Christian Slater actor.; Carly Chaikin 1990- actor.; Portia Doubleday actor.; Martin Wallström 1983- actor.; USA Network, production company.; Universal Cable Productions, production company.; Anonymous Content (Firm), production company.; Universal Studios Home Entertainment (Firm), publisher.

Widescreen.. 2016

Available at UDM McNichols Campus Library  UDM McNichols Campus Library Circulation Desk DVD Collection  (PN 1992.77 .M767 A4 Season 1 DVD )()

49
Mr. Robot. Season_2.0
Material Type:
Video
Add to e-Shelf

Mr. Robot. Season_2.0

Christian Slater television producer, actor.; Sam Esmail creator.; Rami Malek actor.; Portia Doubleday actor.; Carly Chaikin 1990- actor.; Michael Cristofer actor.; Stephanie Corneliussen actor.; Martin Wallström 1983- actor.; Grace Gummer 1986- actor.; USA Network, presenter.; Universal Cable Productions, presenter.; Anonymous Content (Firm), presenter.; Esmail Corp., production company.; Universal Pictures Home Entertainment (Firm), publisher.

2017

Available at UDM McNichols Campus Library  UDM McNichols Campus Library Circulation Desk DVD Collection  (PN 1992.77 .M767 A4 Season 2 DVD )()

50
The dotCrime manifesto : how to stop Internet crime
Material Type:
Book
Add to e-Shelf

The dotCrime manifesto : how to stop Internet crime

Phillip Hallam-Baker

c2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .H35 2008 )()