BACK TO BOOK LSTA GRANT LIBRARY PURCHASES 2013 TITLE Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure Basics of Web Hacking: Tools and Techniques to Attack the Web Black Code: Inside the Battle for Cyberspace Blackhatonomics: An Inside Look at the Economics of Cybercrime CCNA Security Course Booklet Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests Computer and Information Security Handbook Computer Forensics: InfoSec Pro Guide Conflict and Cooperation in Cyberspace Critical Infrastructure System Security and Resiliency Critical Infrastructure: Homeland Security and Emergency Preparedness Cyber Attacks: Protecting National Infrastructure Cyber Conflict: Competing National Perspectives Cyber Crime and the Victimization of Women: Laws, Rights and Regulations Cyber Security Policy Guidebook Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Cyber War: The Next Threat to National Security and What to Do About It Cyber War Will Not Take Place Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World Cybercrime and Cloud Forensics: Applications for Investigation Processes Cybercrime and the Law: Challenges, Issues, and Outcomes Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century Cyberpower : crime, conflict and security Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS Cybersecurity: Public Sector Threats and Responses Cybersecurity: Shared Risks, Shared Responsibilities Cybersecurity: The Essential Body of Knowledge YEAR 2013 2013 2013 2013 2012 2013 2013 2013 2014 2013 2013 2013 2012 2012 2012 2012 2012 2013 2013 2013 2013 2012 2013 2012 2012 2013 2012 Cyberspace and Cybersecurity Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World Cyberspaces and Global Affairs Cyberthreats and International Law Dark Sides of the Internet: On Cyber Threats and Information Warfare Dark Web: Exploring and Data Mining the Dark Side of the Web Data Mining and Machine Learning in Cybersecurity Digital Forensics for Handheld Devices Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval Ethical and Social Issues in the Information Age Facebook Nation Federal Information Security Management Act (Fisma): A Legal Research Guide Fierce Domain: Conflicts in Cyberspace Handbook of Computational Approaches to Counterterrorism Handbook of SCADA/ Control Systems Security Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges Hands-On Ethical Hacking and Network Defense Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Inside Cyber Warfare Intelligent Systems for Security Informatics Introduction to Computer Networks and Cybersecurity Introduction to Cyber-Warfare: A Multidisciplinary Approach Investigating Cyber Law and Cyber Ethics:: Issues, Impacts and Practices Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives Law of Cybercrimes and Their Investigations Legal Guide to Cybersecurity Research Mastering Windows Network Forensics and Investigation Modern Warfare, Intelligence and Deterrence: The Technologies That Are Transforming Them Network Anomaly Detection: A Machine Learning Perspective 2013 2012 2012 2012 2013 2012 2011 2013 2013 2013 2013 2013 2013 2013 2013 2012 2013 2013 2012 2013 2013 2013 2012 2013 2012 2013 2012 2011 2014 Network Forensics: Tracking Hackers Through Cyberspace Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Policing Cyber Hate, Cyber Threats and Cyber Terrorism Psychology of Cyber Crime: Concepts and Principles Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets Sailing Safe in Cyberspace Securing Cyberspace: A New Domain for National Security Smart Grid Security: An End-to-End View of Security in the New Electrical Grid Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies Technocrime, Policing and Surveillance Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Virtualization Security: Protecting Virtualized Environments 2012 2013 2012 2012 2012 2013 2012 2012 2013 2013 2013 2013