Skip navigation

Navigation Menu

Contextual Navigation Menu

  • Search Results

    "Computer Security" search found 610 titles.
    Pages << 1 2 3 4 ...10 ...20 ...30 31 >>
    • Search Result #1. Managing cybersecurity risk : how directors and corporate officers can protect their businesses by Reuvid, Jonathan,

      • 1.
      •  
    • Title
      Managing cybersecurity risk : how directors and corporate officers can protect their businesses Second edition.
      Author
      Reuvid, Jonathan,
      Call number
      EBSCO EBOOK
      Publisher
      Edition
      Pub date
      2017
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1517583
    • Search Result #2. Cybersecurity and privacy : bridging the gap by Khajuria, Samant.

      • 2.
      •  
    • Title
      Cybersecurity and privacy : bridging the gap
      Author
      Khajuria, Samant.
      Call number
      EBSCO EBOOK
      Publisher
      Edition
      Pub date
      2017
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800574
    • Search Result #3. Kali Linux Cookbook - Second Edition by Schultz, Corey P.

      • 3.
      •  
    • Title
      Kali Linux Cookbook - Second Edition 2nd ed.
      Author
      Schultz, Corey P.
      Call number
      EBSCO EBOOK
      Publisher
      Edition
      Pub date
      2016
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1621701
    • Search Result #4. Cyber security and policy : a substantive dialogue by Colarik, Andrew M.,

      • 4.
      •  
    • Title
      Cyber security and policy : a substantive dialogue
      Author
      Colarik, Andrew M.,
      Call number
      EBSCO EBOOK
      Publisher
      Edition
      Pub date
      2017
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1587426
    • Search Result #5. OpenVPN cookbook by Keijser, Jan Just,

      • 5.
      •  
    • Title
      OpenVPN cookbook Second edition.
      Author
      Keijser, Jan Just,
      Call number
      Ebsco eBook
      Publisher
      Edition
      Pub date
      2017
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1470342
    • Search Result #6. Advanced penetration testing for highly-secured environments : the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide by Allen, Lee.

      • 6.
      •  
    • Title
      Advanced penetration testing for highly-secured environments : the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide
      Author
      Allen, Lee.
      Call number
      Ebsco eBook
      Publisher
      Edition
      Pub date
      2012
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=456955
    • Search Result #7. Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET by Kumar, C. Sathiya,

      • 7.
      •  
    • Title
      Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET
      Author
      Kumar, C. Sathiya,
      Call number
      TK5105.77
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2070386
    • Search Result #8. Bytes, bombs, and spies : the strategic dimensions of offensive cyber operations by Lin, Herbert,

      • 8.
      •  
    • Title
      Bytes, bombs, and spies : the strategic dimensions of offensive cyber operations
      Author
      Lin, Herbert,
      Call number
      U167.5 .C92 B98 2018
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1948703
    • Search Result #9. Recoverability as a first-class security objective : proceedings of a workshop by Johnson, Anne Frances,

      • 9.
      •  
    • Title
      Recoverability as a first-class security objective : proceedings of a workshop
      Author
      Johnson, Anne Frances,
      Call number
      QA76.9 .D348
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1925046
    • Search Result #10. Cyber defence in Industry 4.0 systems and related logistics and IT infrastructures by NATO Advanced Research Workshop on Cyber Defense in Industry 4.0 Systems and Related Logistics and IT Infrastructures (2017 : Jyvaskyla, Finland)

      • 10.
      •  
    • Title
      Cyber defence in Industry 4.0 systems and related logistics and IT infrastructures
      Author
      NATO Advanced Research Workshop on Cyber Defense in Industry 4.0 Systems and Related Logistics and IT Infrastructures (2017 : Jyvaskyla, Finland)
      Call number
      TK5105.59 .N38 2018 eb
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1909994
    • Search Result #11. EU GDPR : a pocket guide by Calder, Alan, 1957-

      • 11.
      •  
    • Title
      EU GDPR : a pocket guide School's edition.
      Author
      Calder, Alan, 1957-
      Call number
      KJE6071 .C35 2018 eb
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1901976
    • Search Result #12. Hands-on incident response and digital forensics by Sheward, Mike,

      • 12.
      •  
    • Title
      Hands-on incident response and digital forensics
      Author
      Sheward, Mike,
      Call number
      HV6773
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1788975
    • Search Result #13. Combating cyber threat by Singh, P. K.,

      • 13.
      •  
    • Title
      Combating cyber threat
      Author
      Singh, P. K.,
      Call number
      HV6773.15 .C97 C66 2018
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1839747
    • Search Result #14. Fuzzing for software security testing and quality assurance by Takanen, Ari,

      • 14.
      •  
    • Title
      Fuzzing for software security testing and quality assurance Second edition.
      Author
      Takanen, Ari,
      Call number
      QA76.9 .A25 F89 2018 eb
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1825934
    • Search Result #15. Information Security : foundations, technologies and applications by Awad, Ali Ismail,

      • 15.
      •  
    • Title
      Information Security : foundations, technologies and applications
      Author
      Awad, Ali Ismail,
      Call number
      QA76.9 .A25 I56 2018 eb
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1805102
    • Search Result #16. Attribute-Based Access Control by Hu, Vincent.

      • 16.
      •  
    • Title
      Attribute-Based Access Control
      Author
      Hu, Vincent.
      Call number
      QA76.9 .A25
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1825932
    • Search Result #17. Empirical research for software security : foundations and experience by Othmane, Lotfi ben.

      • 17.
      •  
    • Title
      Empirical research for software security : foundations and experience First edition.
      Author
      Othmane, Lotfi ben.
      Call number
      QA76.9 .A25
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640742
    • Search Result #18. Digital forensics and incident response : an intelligent way to respond to attacks by Johansen, Gerard,

      • 18.
      •  
    • Title
      Digital forensics and incident response : an intelligent way to respond to attacks
      Author
      Johansen, Gerard,
      Call number
      HV8073
      Publisher
      Edition
      Pub date
      2017
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1562684
    • Search Result #19. Not your average tech company : What is Huawei and why it matters [videorecording] by Arsenault, Adrienne

      • 19.
      •  
    • Title
      Not your average tech company : What is Huawei and why it matters [videorecording]
      Author
      Arsenault, Adrienne
      Call number
      XX(748182.1)
      Publisher
      Edition
      Pub date
      2018
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://curio.ca/en/video/not-your-average-tech-company-what-is-huawei-and-why-it-matters-20074/
    • Search Result #20. Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacks by Thakkar, Dhanya,

      • 20.
      •  
    • Title
      Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacks
      Author
      Thakkar, Dhanya,
      Call number
      QA76.9 .A25
      Publisher
      Edition
      Pub date
      2017
      Holdings
      • Visit new URL: http://ra.ocls.ca/ra/login.aspx?inst=sault&url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1527811
  • Pages << 1 2 3 4 ...10 ...20 ...30 31 >>

Library Info

Contextual Navigation Menu