Search Results for Computer networks -- Security measures -- United States SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bUnited$002bStates$0026ps$003d300? 2020-09-21T12:30:46Z Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:838076 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Carvey, Harlan A., author<br/>Author&#160;Carvey, Harlan A., author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C374 2014<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171572<br/> FISMA and the risk management framework : the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:818387 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Gantz, Stephen D., editor<br/>Author&#160;Gantz, Stephen D., editor,&#160;Philpott, Daniel R., editor,&#160;Windham, Darren, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F574 2013<br/>Publisher&#160;Elsevier/Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597496414<br/> The Stuxnet Computer Worm and industrial control system security ent://SD_ILS/0/SD_ILS:798946 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Rebane, Jackson C.<br/>Author&#160;Rebane, Jackson C.<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 S78 2011<br/>Publisher&#160;Nova Science Publisher&rsquo;s, Inc.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781612099859<br/> Creating a national framework for cybersecurity : an analysis of issues and options ent://SD_ILS/0/SD_ILS:641313 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Fischer, Eric A.<br/>Author&#160;Fischer, Eric A.<br/>Format:&#160;Books<br/>Call Number&#160;HV6432 F57 2009<br/>Publisher&#160;Nova Science Publishers,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781604565591<br/> Schneier on security ent://SD_ILS/0/SD_ILS:287538 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Schneier, Bruce, 1963-<br/>Author&#160;Schneier, Bruce, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S336 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470395356<br/> Windows forensics : the field guide for corporate computer investigations ent://SD_ILS/0/SD_ILS:277857 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Steel, Chad<br/>Author&#160;Steel, Chad<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 S84 2006<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470038628<br/> Critical infrastructure protection in homeland security : defending a networked nation ent://SD_ILS/0/SD_ILS:103840 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Lewis, T. G., (Theodore Gyle), 1941-<br/>Author&#160;Lewis, T. G., (Theodore Gyle), 1941-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L48 2006<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471786283<br/> Critical infrastructure protection in homeland security defending a networked nation ent://SD_ILS/0/SD_ILS:568191 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Lewis, Theodore Gyle<br/>Author&#160;Lewis, Theodore Gyle<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8586<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471786283<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:444224 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Paquet, Cathrine<br/>Author&#160;Paquet, Cathrine,&#160;Saxe, Warren<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P36 2005<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781587201219<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:425362 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A93 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535311<br/> Electronic selling : twenty-three steps to e-selling profits ent://SD_ILS/0/SD_ILS:467790 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Jamison, Brian<br/>Author&#160;Jamison, Brian,&#160;Gold, Josh,&#160;Jamison, Warren<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.325.U6 J35 1997<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780070329300<br/> Protecting yourself online : the definitive resource on safety, freedom, and privacy in cyberspace ent://SD_ILS/0/SD_ILS:794299 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Gelman, Robert B.<br/>Author&#160;Gelman, Robert B.,&#160;McCandlish, Stanton<br/>Format:&#160;Books<br/>Call Number&#160;KF390.5.C6 G45 1998<br/>Publisher&#160;Harper Edge,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780062515124<br/> Cybersecurity Law ent://SD_ILS/0/SD_ILS:871987 2020-09-21T12:30:46Z 2020-09-21T12:30:46Z by&#160;Kosseff, Jeff<br/>Author&#160;Kosseff, Jeff<br/>Format:&#160;Books<br/>Call Number&#160;KF1263.C65 K67 2017<br/>ISBN&#160;9781119231509<br/>