BOOK LSTA GRANT LIBRARY PURCHASES 2013

advertisement
BACK TO BOOK LSTA GRANT LIBRARY PURCHASES 2013
TITLE
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Basics of Web Hacking: Tools and Techniques to Attack the Web
Black Code: Inside the Battle for Cyberspace
Blackhatonomics: An Inside Look at the Economics of Cybercrime
CCNA Security Course Booklet
Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests
Computer and Information Security Handbook
Computer Forensics: InfoSec Pro Guide
Conflict and Cooperation in Cyberspace
Critical Infrastructure System Security and Resiliency
Critical Infrastructure: Homeland Security and Emergency Preparedness
Cyber Attacks: Protecting National Infrastructure
Cyber Conflict: Competing National Perspectives
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations
Cyber Security Policy Guidebook
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Cyber War: The Next Threat to National Security and What to Do About It
Cyber War Will Not Take Place
Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World
Cybercrime and Cloud Forensics: Applications for Investigation Processes
Cybercrime and the Law: Challenges, Issues, and Outcomes
Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century
Cyberpower : crime, conflict and security
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Shared Risks, Shared Responsibilities
Cybersecurity: The Essential Body of Knowledge
YEAR
2013
2013
2013
2013
2012
2013
2013
2013
2014
2013
2013
2013
2012
2012
2012
2012
2012
2013
2013
2013
2013
2012
2013
2012
2012
2013
2012
Cyberspace and Cybersecurity
Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World
Cyberspaces and Global Affairs
Cyberthreats and International Law
Dark Sides of the Internet: On Cyber Threats and Information Warfare
Dark Web: Exploring and Data Mining the Dark Side of the Web
Data Mining and Machine Learning in Cybersecurity
Digital Forensics for Handheld Devices
Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and
Retrieval
Ethical and Social Issues in the Information Age
Facebook Nation
Federal Information Security Management Act (Fisma): A Legal Research Guide
Fierce Domain: Conflicts in Cyberspace
Handbook of Computational Approaches to Counterterrorism
Handbook of SCADA/ Control Systems Security
Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges
Hands-On Ethical Hacking and Network Defense
Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide
Inside Cyber Warfare
Intelligent Systems for Security Informatics
Introduction to Computer Networks and Cybersecurity
Introduction to Cyber-Warfare: A Multidisciplinary Approach
Investigating Cyber Law and Cyber Ethics:: Issues, Impacts and Practices
Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives
Law of Cybercrimes and Their Investigations
Legal Guide to Cybersecurity Research
Mastering Windows Network Forensics and Investigation
Modern Warfare, Intelligence and Deterrence: The Technologies That Are Transforming Them
Network Anomaly Detection: A Machine Learning Perspective
2013
2012
2012
2012
2013
2012
2011
2013
2013
2013
2013
2013
2013
2013
2013
2012
2013
2013
2012
2013
2013
2013
2012
2013
2012
2013
2012
2011
2014
Network Forensics: Tracking Hackers Through Cyberspace
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime
Suspects
Policing Cyber Hate, Cyber Threats and Cyber Terrorism
Psychology of Cyber Crime: Concepts and Principles
Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets
Sailing Safe in Cyberspace
Securing Cyberspace: A New Domain for National Security
Smart Grid Security: An End-to-End View of Security in the New Electrical Grid
Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies
Technocrime, Policing and Surveillance
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Virtualization Security: Protecting Virtualized Environments
2012
2013
2012
2012
2012
2013
2012
2012
2013
2013
2013
2013
Download