Search Results for Computer security -- United States - Narrowed by: Computer security -- United StatesSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$002b--$002bUnited$002bStates$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bUnited$002bStates$002509Computer$002bsecurity$002b--$002bUnited$002bStates$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-03T04:53:23ZFISMA and the risk management framework : the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:8183872024-06-03T04:53:23Z2024-06-03T04:53:23Zby Gantz, Stephen D., editor<br/>Author Gantz, Stephen D., editor, Philpott, Daniel R., editor, Windham, Darren, editor<br/>Format: Books<br/>Call Number QA76.9.A25 F574 2013<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2013<br/>ISBN 9781597496414<br/>Encyclopaedia of cyber law and computer security : measures , controls & practicesent://SD_ILS/0/SD_ILS:8140482024-06-03T04:53:23Z2024-06-03T04:53:23Zby Moore, Paul., editor<br/>Author Moore, Paul., editor<br/>Format: Books<br/>Call Number TK7885.A2 E53 2012 re v.1<br/>Publisher Nyx Academics,<br/>Publication Date 2012<br/>ISBN 9781621580003<br/>The Stuxnet Computer Worm and industrial control system securityent://SD_ILS/0/SD_ILS:7989462024-06-03T04:53:23Z2024-06-03T04:53:23Zby Rebane, Jackson C.<br/>Author Rebane, Jackson C.<br/>Format: Books<br/>Call Number TS156.8 S78 2011<br/>Publisher Nova Science Publisher’s, Inc.,<br/>Publication Date 2011<br/>ISBN 9781612099859<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:7555732024-06-03T04:53:23Z2024-06-03T04:53:23Zby Amoroso, Edward G.<br/>Author Amoroso, Edward G.<br/>Format: Books<br/>Call Number HV6773.2 A47 2011<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 2011<br/>ISBN 9780123849175<br/>Creating a national framework for cybersecurity : an analysis of issues and optionsent://SD_ILS/0/SD_ILS:6413132024-06-03T04:53:23Z2024-06-03T04:53:23Zby Fischer, Eric A.<br/>Author Fischer, Eric A.<br/>Format: Books<br/>Call Number HV6432 F57 2009<br/>Publisher Nova Science Publishers,<br/>Publication Date 2009<br/>ISBN 9781604565591<br/>Schneier on securityent://SD_ILS/0/SD_ILS:2875382024-06-03T04:53:23Z2024-06-03T04:53:23Zby Schneier, Bruce, 1963-<br/>Author Schneier, Bruce, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 S336 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470395356<br/>Information security research : new methods for protecting against cyber threatsent://SD_ILS/0/SD_ILS:2534282024-06-03T04:53:23Z2024-06-03T04:53:23Zby Wang, Cliff<br/>Author Wang, Cliff, United States. Dept. of Defense<br/>Format: Books<br/>Call Number QA76.9.A25 I54 2007<br/>Publisher Wiley,<br/>Publication Date 2007<br/>ISBN 9780471787563<br/>The electronic privacy papers : documents on the battle for privacy in the age of surveillanceent://SD_ILS/0/SD_ILS:4816062024-06-03T04:53:23Z2024-06-03T04:53:23Zby Schneier, Bruce, 1963-<br/>Author Schneier, Bruce, 1963-, Banisar, David<br/>Format: Books<br/>Call Number JC596.2.U5 E44 1997<br/>Publisher Wiley,<br/>Publication Date 1997<br/>ISBN 9780471122975<br/>