Principles of cybersecurity law /Author: Mireles, Michael S.
Publisher: Eagan, MN : West Academic Publishing,
Date: [2024] This title can be found in 1 Iowa libraries.
Cryptography and network security : principles and practice /Author: Stallings, William,
Publisher: Harlow : Pearson,
Date: [2023] This title can be found in 1 Iowa libraries.
Public and private governance of cybersecurity : challenges and potential /Publisher: Cambridge, United Kingdom ; Cambridge University Press,
Date: 2023. This title can be found in 1 Iowa libraries.
Cybercrime and Information technology : theory and practice--the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices /Author: Alexandrou, Alex
Publisher: Boca Raton : CRC Press, Taylor & Francis Group,
Date: 2022. This title can be found in 1 Iowa libraries.
Breached! : why data security law fails and how to improve it /Author: Solove, Daniel J.,
Publisher: New York, NY : Oxford University Press,
Date: [2022] This title can be found in 1 Iowa libraries.
Social engineering : how crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication /Author: Gehl, Robert W.,
Publisher: Cambridge, Massachusetts : The MIT Press,
Date: [2022] This title can be found in 1 Iowa libraries.
The Oxford handbook of cyber security /Publisher: Oxford, United Kingdom ; Oxford University Press,
Date: 2021. This title can be found in 1 Iowa libraries.
Blue team handbook : incident response edition : a condensed field guide for the cyber security incident responder /Author: Murdoch, D. W.
Publisher: [United States] CreateSpace Independent Publishing
Date: 2014 This title can be found in 1 Iowa libraries.
Security of information and communication networks /Author: Kartalopoulos, Stamatios V.
Publisher: Hoboken, N.J. : Wiley,
Date: c2009. This title can be found in 4 Iowa libraries.
Aspects of regulating freedom of expression on the Internet /Author: Cucereanu, Dragoş.
Publisher: Portland : Intersentia,
Date: c2008. This title can be found in 2 Iowa libraries.
The art of software security assessment : identifying and preventing software vulnerabilities /Author: Dowd, Mark.
Publisher: Indianapolis, Ind. : Addison-Wesley,
Date: c2007. This title can be found in 2 Iowa libraries.
Defense and detection strategies against Internet worms /Author: Nazario, Jose.
Publisher: Boston, MA : Artech House,
Date: 2004. This title can be found in 1 Iowa libraries.
Hack attacks denied a complete guide to network lockdown /Format: [electronic resource] :
Author: Chirillo, John,
Publisher: New York : Wiley,
Date: 2001. This title can be found in 1 Iowa libraries.
Hack attacks revealed a complete reference with custom security hacking toolkit /Format: [electronic resource] :
Author: Chirillo, John,
Publisher: New York : Wiley,
Date: 2001. This title can be found in 1 Iowa libraries.
Firewalls and Internet security : repelling the wily hacker /Author: Cheswick, William R.
Publisher: Reading, Mass. : Addison-Wesley,
Date: c1994. This title can be found in 5 Iowa libraries.
YOU MAY BORROW ITEMS YOU FIND IN THE SILO LOCATOR THROUGH YOUR
LOCAL PUBLIC LIBRARY.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.