Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
1194 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
..
96
97
98
99
100
000000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1189.
Maximum Security, Third Edition
Maximum Security, Third Edition
by
Anonymous, author.
https://learning.oreilly.com/library/view/~/0672318717
https://learning.oreilly.com/library/view/~/0672318717/?ar
https://go.oreilly.com/library-access/library/view/-/0672318717/?ar
Format:
Electronic Resources
1190.
Building Internet Firewalls : Internet and Web security
Building Internet Firewalls : Internet and Web security
by
Zwicky, Elizabeth D.
https://learning.oreilly.com/library/view/~/1565928717
https://learning.oreilly.com/library/view/~/1565928717/?ar
https://go.oreilly.com/library-access/library/view/-/1565928717/?ar
Format:
Electronic Resources
1191.
The Modelling and Analysis of Security Protocols: the CSP Approach
The Modelling and Analysis of Security Protocols: the CSP Approach
by
Ryan, P., author.
https://go.oreilly.com/library-access/library/view/-/0201674718/?ar
https://learning.oreilly.com/library/view/~/0201674718/?ar
https://learning.oreilly.com/library/view/~/0201674718
Format:
Electronic Resources
1192.
Virtual private networks
Virtual private networks
by
Scott, Charlie.
https://go.oreilly.com/library-access/library/view/-/1565925297/?ar
https://learning.oreilly.com/library/view/~/1565925297/?ar
https://learning.oreilly.com/library/view/~/1565925297
Format:
Electronic Resources
1193.
Understanding Public-Key Infrastructure : Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure : Concepts, Standards, and Deployment Considerations
by
Adams, Carlisle, author.
https://learning.oreilly.com/library/view/~/157870166X
https://learning.oreilly.com/library/view/~/157870166X/?ar
https://go.oreilly.com/library-access/library/view/-/157870166X/?ar
Format:
Electronic Resources
1194.
Web security & commerce
Web security & commerce
by
Garfinkel, Simson.
https://learning.oreilly.com/library/view/~/1565922697/?ar
https://learning.oreilly.com/library/view/~/1565922697
https://go.oreilly.com/library-access/library/view/-/1565922697/?ar
Format:
Electronic Resources
Select All
1
..
96
97
98
99
100
1194 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Material Type: E-Book
Included
Subject: Computer networks -- Security measures.
Author
Include
Exclude
ScienceDirect (Online service)
(63)
Safari, an O'Reilly Media Company.
(31)
ProQuest (Firm)
(22)
O'Reilly (Firm), publisher.
(15)
Syngress.
(15)
Cisco Systems, Inc.
(12)
IGI Global.
(12)
Redbooks, IBM.
(11)
O'Reilly for Higher Education (Firm), distributor.
(9)
Vacca, John R.
(9)
Beale, Jay.
(7)
Shinder, Thomas W.
(7)
Cole, Eric.
(6)
International Business Machines Corporation. International Technical Support Organization.
(6)
Liska, Allan, author.
(6)
Packt Publishing, publisher.
(6)
Shimonski, Robert.
(6)
Cardwell, Kevin, author.
(5)
Gupta, Sunil, speaker.
(5)
Mason, Andrew.
(5)
Messier, Ric, author.
(5)
Rittinghouse, John W.
(5)
Snedaker, Susan.
(5)
Velu, Vijay Kumar, author.
(5)
Andress, Jason, author.
(4)
Babbin, Jacob.
(4)
Beaver, Kevin.
(4)
Carvey, Harlan A., author.
(4)
Chuvakin, Anton.
(4)
Dalziel, Henry, author.
(4)
Diogenes, Yuri, author.
(4)
Foster, James C.
(4)
Gregg, Michael (Michael C.)
(4)
Lucas, Mark.
(4)
Manning (Firm), publisher.
(4)
O'Reilly for Higher Education (Firm)
(4)
Olups, Rihards, author.
(4)
Orebaugh, Angela.
(4)
Santos, Omar, on-screen presenter.
(4)
Santos, Omar.
(4)
Syngress Media, Inc.
(4)
Vacca, John R., editor.
(4)
Woland, Aaron T., author.
(4)
Wotring, Brian.
(4)
Alder, Raven.
(3)
Andress, Jason.
(3)
Archibald, Neil.
(3)
Barth, Doug, on-screen presenter.
(3)
Berlin, Amanda, author.
(3)
Bidgoli, Hossein.
(3)
Bowen, Richard Cooper, 1971-
(3)
Bücker, Axel.
(3)
Calder, Alan, 1957-
(3)
Calder, Alan, 1957- author.
(3)
Canavan, Tom.
(3)
Cantrell, Chris.
(3)
Carvey, Harlan A.
(3)
Coar, Ken A. L.
(3)
Collins, Michael (Michael Patrick), author.
(3)
Contos, Brian T.
(3)
Cross, Michael, 1965-
(3)
Diogenes, Yuri.
(3)
Dubrawsky, Ido.
(3)
Erickson, Jon, 1977-
(3)
Frahim, Jazib.
(3)
Francis, Dishan, author.
(3)
Gantz, Stephen D.
(3)
Gilman, Evan, on-screen presenter.
(3)
Givre, Charles, presenter.
(3)
Gonzalez, Deborah, author.
(3)
Henmi, Anne.
(3)
Hunter, Laura E.
(3)
Jaswal, Nipun, author.
(3)
Johansen, Gerard, author.
(3)
Limbert, Matthew, designer.
(3)
Liu, Dale.
(3)
Lockhart, Andrew.
(3)
Manzuik, Steve.
(3)
Messier, Ric, speaker.
(3)
Microsoft Corporation.
(3)
Morris, Greg.
(3)
Nickel, Jochen, author.
(3)
Northcutt, Stephen.
(3)
O'Reilly & Associates.
(3)
Ozkaya, Erdal, author.
(3)
Potter, Bruce.
(3)
Ramirez, Gilbert.
(3)
Ransome, James F.
(3)
Ring, Sandra.
(3)
Rogers, Russ.
(3)
Rountree, Derrick.
(3)
Russell, Brian, author.
(3)
Sabih, Zaid, on-screen presenter.
(3)
Santos, Omar, presenter.
(3)
Scambray, Joel.
(3)
Schiller, Craig A.
(3)
Sharma, Himanshu, author.
(3)
Sheward, Mike, author.
(3)
Shinder, Debra Littlejohn.
(3)
Singh, Abhishek.
(3)
SpringerLink (Online service)
(3)
Steinberg, Joseph (Cybersecurity expert), author.
(3)
Tam, Kenneth.
(3)
Thuraisingham, Bhavani M.
(3)
Tiller, James S.
(3)
Uytterhoeven, Patrik, author.
(3)
Viega, John.
(3)
Warnicke, Ed.
(3)
Watkins, Stephen.
(3)
Wayner, Peter, 1964-
(3)
Wiles, Jack.
(3)
Wilhelm, Thomas.
(3)
Williams, Branden R.
(3)
Williams, Geraint, author.
(3)
Winterfeld, Steve.
(3)
Zalewski, Michal.
(3)
Ackerman, Pascal, author.
(2)
Adams, Carlisle, author.
(2)
Addison-Wesley Professional (Firm), publisher.
(2)
Ahmad, David R. Mirza.
(2)
Akanbi, Oluwatobi Ayodeji, author.
(2)
Akula, Madhu, author.
(2)
Albing, Carl, author.
(2)
Allsopp, Wil.
(2)
Amini, Rob.
(2)
Amiri, Iraj Sadegh, 1977- author.
(2)
Amon, Cherie.
(2)
Anonymous, author.
(2)
Ansari, Juned Ahmed, author.
(2)
Arnold, William, author.
(2)
Bahadur, Gary.
(2)
Baker, Andrew R.
(2)
Barnett, Ryan C.
(2)
Barrett, Daniel J.
(2)
Baskin, Brian, author.
(2)
Baskin, Brian.
(2)
Baumrucker, C. Tate.
(2)
Beaver, Kevin, author.
(2)
Bejtlich, Richard.
(2)
Beltrame, Jason, author.
(2)
Bendell, Dan.
(2)
Berkouwer, Sander, author.
(2)
Bhardwaj, Pawan K.
(2)
Bindner, Andrew.
(2)
Bolt, Steven.
(2)
Bradley, Tony, 1969-
(2)
Brant, Justin M.
(2)
Broad, James.
(2)
Brooks, R. R. (Richard R.)
(2)
Brotherston, Lee, author.
(2)
Byrnes, Robert G.
(2)
Cameron, Rob.
(2)
Carey, Marcus J. (Cybersecurity professional), author.
(2)
Carpenter, Perry, author.
(2)
Carter, Earl.
(2)
Cerra, Allison, author.
(2)
Chapman, Chris, author.
(2)
Chauhan, Sudhanshu, author.
(2)
Chebbi, Chiheb, author.
(2)
Cherry, Denny.
(2)
Chuvakin, Anton A., author.
(2)
Clarke, Justin.
(2)
Conti, Greg.
(2)
Coombs, Ted, author.
(2)
Cunningham, Chase, author.
(2)
Czagan, Dawid, presenter.
(2)
Danielyan, Edgar.
(2)
Danseglio, Mike.
(2)
Datt, Samir, author.
(2)
Deal, Richard A.
(2)
Dhanjani, Nitesh.
(2)
Dion, Jason, on-screen presenter.
(2)
Duffy, Christopher, author.
(2)
Dwivedi, Himanshu.
(2)
Easttom, Chuck, author.
(2)
Ellis, Juanita.
(2)
Ely, Adam.
(2)
Erbschloe, Michael, 1951-
(2)
Esler, Joel.
(2)
Fazeldehkordi, Elahe, author.
(2)
Fichera, Joe, 1966-
(2)
Fink, Glenn A., editor.
(2)
Flaus, Jean-Marie, author.
(2)
Flow, Sparc, author.
(2)
Fowler, Kevvie, author.
(2)
Fry, Chris.
(2)
Furnell, Steven.
(2)
Gallo, Tim, editor.
(2)
Garfinkel, Simson.
(2)
Gatford, Chris.
(2)
Gomes, Araceli Treu, author.
(2)
Gough, Michael.
(2)
Grasdal, Martin.
(2)
Haber, Morey J., author.
(2)
Haines, Brad.
(2)
Halleen, Gary.
(2)
Hancock, Bill, 1957-
(2)
Harrington, Jan L.
(2)
Harris, Shon.
(2)
Hosmer, Chet, author.
(2)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(1165)
German
(14)
Chinese
(4)
Polish
(3)
Undetermined
(3)
French
(2)
English, Middle (1100-1500)
(1)
Italian
(1)
Japanese
(1)
Russian
(1)
Spanish
(1)
Swedish
(1)
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
This graph shows the distribution of publication dates for use with a date range slider. Switch to Years view for a more detailed breakdown of search results by year.
From Publication Year
-
To Publication Year
2018
(100)
2014
(87)
2016
(79)
2017
(77)
2015
(75)
2013
(72)
2019
(68)
2006
(62)
2005
(54)
2011
(54)
2022
(54)
2008
(50)
2003
(47)
2012
(46)
2004
(45)
2007
(44)
2002
(39)
2009
(39)
2020
(38)
2010
(34)
2021
(21)
2001
(12)
2023
(4)
1999
(2)
2000
(2)
1
(1)
3
(1)
1997
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Electronic books.
(784)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(681)
Computer security.
(499)
Sécurité informatique.
(281)
Computer Security
(164)
COMPUTERS -- Security -- General.
(158)
COMPUTERS -- Networking -- Security.
(119)
COMPUTERS -- Internet -- Security.
(112)
Electronic books. -- local.
(84)
Data protection.
(82)
Penetration testing (Computer security)
(77)
Internet -- Security measures.
(69)
Tests d'intrusion.
(62)
Protection de l'information (Informatique)
(61)
Information technology -- Security measures.
(60)
Computers -- Access control.
(51)
Computer security -- Management.
(48)
Technologie de l'information -- Sécurité -- Mesures.
(48)
Computer networks -- Access control.
(44)
Firewalls (Computer security)
(42)
Computer crimes -- Investigation.
(38)
Engineering & Applied Sciences.
(38)
Ordinateurs -- Accès -- Contrôle.
(35)
Sécurité informatique -- Gestion.
(33)
Information technology -- Management.
(32)
Coupe-feu (Sécurité informatique)
(31)
Electrical & Computer Engineering.
(31)
Instructional films.
(31)
Internet videos.
(31)
Nonfiction films.
(31)
Telecommunications.
(31)
Computer crimes -- Prevention.
(30)
Internet -- Sécurité -- Mesures.
(30)
Web sites -- Security measures.
(30)
Hackers.
(29)
Hacking.
(29)
COMPUTERS -- Security -- Networking.
(26)
Technologie de l'information -- Gestion.
(26)
Criminalité informatique -- Enquêtes.
(25)
Electronic videos.
(25)
Piratage informatique.
(24)
Computer network protocols.
(23)
Microsoft Windows (Computer file)
(23)
Pirates informatiques.
(23)
Kali Linux.
(22)
Computer hackers.
(21)
Handbooks and manuals.
(20)
Business enterprises -- Computer networks -- Security measures.
(19)
Cloud computing.
(19)
Cloud computing -- Security measures.
(18)
Operating systems (Computers)
(18)
Application software -- Development.
(17)
Computer crimes.
(17)
Computer networks.
(17)
Computer Science.
(16)
Computersicherheit
(16)
Cyberspace -- Security measures.
(16)
Data protection -- Standards.
(16)
Sites Web -- Sécurité -- Mesures.
(16)
Wireless communication systems -- Security measures.
(16)
COMPUTERS -- Information Technology.
(15)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(15)
Data encryption (Computer science)
(15)
Microsoft Windows server.
(15)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Guides, manuels, etc.
(15)
Infonuagique -- Sécurité -- Mesures.
(14)
Logiciels d'application -- Développement.
(14)
Systèmes d'exploitation (Ordinateurs)
(14)
operating systems.
(14)
Chiffrement (Informatique)
(13)
Computer networks -- Management.
(13)
Infonuagique.
(13)
COMPUTERS -- Computer Literacy.
(12)
COMPUTERS -- Computer Science.
(12)
COMPUTERS -- Data Processing.
(12)
COMPUTERS -- Hardware -- General.
(12)
COMPUTERS -- Machine Theory.
(12)
COMPUTERS -- Reference.
(12)
Linux.
(12)
Open source software.
(12)
Réseaux d'ordinateurs.
(12)
Credit cards.
(11)
Forensic sciences.
(11)
Liability for credit information.
(11)
Network security.
(11)
Protection de l'information (Informatique) -- Normes.
(11)
Python (Computer program language)
(11)
World Wide Web -- Security measures.
(11)
Computer networks -- Security measures -- Examinations.
(10)
Computer networks -- Security measures -- Software.
(10)
Criminalité informatique.
(10)
Cyberterrorism.
(10)
Datensicherung
(10)
Electronic commerce -- Security measures.
(10)
Films autres que de fiction.
(10)
Films de formation.
(10)
Guides et manuels.
(10)
Internet of things.
(10)
Protocoles de réseaux d'ordinateurs.
(10)
Software.
(10)
Vidéos sur Internet.
(10)
Webcast
(10)
Application software -- Security measures.
(9)
Electronic data processing personnel -- Certification.
(9)
Information warfare.
(9)
Machine learning.
(9)
Routers (Computer networks)
(9)
Réseaux d'ordinateurs -- Gestion.
(9)
Study guides.
(9)
Application software -- Testing.
(8)
Audiobooks.
(8)
Business -- Data processing -- Security measures.
(8)
Cartes de crédit.
(8)
Computer network architectures.
(8)
Computers -- Security -- General.
(8)
Cryptography.
(8)
Electronic information resources -- Access control.
(8)
Firewalls (Computer security).
(8)
Handbook
(8)
Python (Langage de programmation)
(8)
Responsabilité pour renseignements sur la solvabilité.
(8)
Routeurs (Réseaux d'ordinateurs)
(8)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Logiciels.
(8)
Transmission sans fil -- Sécurité -- Mesures.
(8)
COMPUTERS -- Networking -- General.
(7)
Client/server computing.
(7)
Computer Communication Networks
(7)
Computer networks -- Monitoring.
(7)
Computer security -- Handbooks, manuals, etc.
(7)
Computer software -- Development.
(7)
Computerbeveiliging.
(7)
Cyberterrorism -- Prevention.
(7)
Database security.
(7)
Downloadable audio books.
(7)
Electronic data processing departments -- Security measures.
(7)
Internet des objets.
(7)
Local area networks (Computer networks) -- Security measures.
(7)
Rechnernetz
(7)
Risk management.
(7)
Réseaux d'ordinateurs -- Surveillance.
(7)
Sécurité informatique -- Guides, manuels, etc.
(7)
United States.
(7)
z/OS.
(7)
BUSINESS & ECONOMICS -- Industrial Management.
(6)
BUSINESS & ECONOMICS -- Management Science.
(6)
BUSINESS & ECONOMICS -- Management.
(6)
BUSINESS & ECONOMICS -- Organizational Behavior.
(6)
COMPUTERS -- Security -- Cryptography.
(6)
Commerce électronique -- Sécurité -- Mesures.
(6)
Computer networks -- Security measures -- Examinations -- Study guides.
(6)
Computer networks -- Security measures -- United States.
(6)
Computer science.
(6)
Computer security -- Evaluation.
(6)
Computer security -- Testing.
(6)
Computer viruses.
(6)
Criminalistique.
(6)
Database management.
(6)
Databescherming.
(6)
Forensic Sciences
(6)
Information storage and retrieval systems -- Security measures.
(6)
Internet
(6)
Internet telephony -- Security measures.
(6)
Internet.
(6)
Java (Computer program language)
(6)
Malware (Computer software)
(6)
Microsoft Windows (Computer file) -- Security measures.
(6)
Penetration testing (Computer security).
(6)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
(6)
Security systems.
(6)
Software engineering.
(6)
Web -- Sécurité -- Mesures.
(6)
Web site development.
(6)
WebSphere.
(6)
Windows Azure.
(6)
forensic science.
(6)
Apprentissage automatique.
(5)
Architecture client-serveur (Informatique)
(5)
Artificial intelligence.
(5)
BUSINESS & ECONOMICS -- Corporate Governance.
(5)
Bases de données -- Gestion.
(5)
Bases de données -- Sécurité -- Mesures.
(5)
Client/server computing -- Security measures.
(5)
Computer networks -- Security measures -- Congresses.
(5)
Computer security -- Examinations.
(5)
Computer technicians -- Certification.
(5)
Computercriminaliteit.
(5)
Computernetwerken.
(5)
Conference papers and proceedings.
(5)
Corporate culture.
(5)
Crisis management.
(5)
Cryptographie.
(5)
Data encryption (Computer science).
(5)
Directory services (Computer network technology)
(5)
Embedded Internet devices.
(5)
Gestion -- Informatique -- Sécurité -- Mesures.
(5)
Gestion du risque.
(5)
Génie logiciel.
(5)
Industries -- Security measures.
(5)
Informatique.
(5)
Intrusion detection systems (Computer security)
(5)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(787)
Ebrary Collection
(317)
Online
(69)
IGI Global
(12)
Knovel Collection
(5)
Springer Collection
(3)
ACS Collection
(1)
More
View All
Fewer
Collapse All
Library
Include
Exclude
IYTE Library
(1194)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}