Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
     
Limit to items not checked out
Nearby SUBJECTS are:
   « Prev Next »
Save Marked Save All
    Year Entries
Computer security -- China.   3
Computer security -- China -- Congresses. : China internet development report 2018 : Blue Book of World Internet Conference / Chinese Academy of Cyberspace Studies.  2020 1
Computer security -- Computer programs.   7
Computer security -- Computer simulation. : Multilevel modeling of secure systems in QoP-ML / author, Bogdan Ksiezopolski.  2015 1
Computer security -- Congresses.   1099
Computer security -- Data processing. : Big data analytics with applications in insider threat detection / Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan.  2018 1
Computer security -- Data processing -- Congresses. : Intelligence and security informatics : international workshop, WISI 2006, Singapore, April 9, 2006 : proceedings / Hsinchun Chen [and others] (eds.).  2006 1
Computer security -- Decision making. : Data analytics and decision support for cybersecurity : trends, methodologies and applications / Ivan Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang, editors.  2017 1
Computer security -- Dictionaries.   4
Computer security -- Dictionaries -- Polyglot. : Elsevier's dictionary of information security in English, German, French and Russian / compiled by G. Manoilov and B. Radichkova.  2007 1
Computer security -- Economic aspects. : Managing information risk and the economics of security / edited by M. Eric Johnson.  2008 1
Computer security -- Economic aspects -- Congresses. : Economics of information security and privacy III / Bruce Schneier, editor.  2013 1
Computer security -- Economic aspects -- Risk management. : Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions / Paul Rohmeyer and Jennifer L. Bayuk ; foreword by Dr. Larry Ponemon.  2019 1
Computer security -- Employees -- Training of.   2
Computer security -- Employees -- Training of -- United States.   6
Computer security -- Encyclopedias. : Encyclopedia of cryptography and security / Henk C.A. van Tilborg, Sushil Jajodia (eds.).  2011 1
Computer security equipment industry. : The new school of information security / Adam Shostack and Andrew Stewart.  2008 1
Computer security equipment industry -- Corrupt practices. : "Free security scan" could cost time and money.  2008 1
Computer security equipment industry -- Directories. : Enterprise directory and security implementation guide : designing and implementing directories in your organization / Charles Carrington [and others].  2002 1
Computer security equipment industry -- Government policy -- United States. : Wassenaar: cybersecurity and export controls : joint hearing before the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, January 12, 2016.  2017 1
Computer security equipment industry -- Vocational guidance. : Breaking into information security : crafting a custom career path to get the job you really want / Josh More, Anthony J. Stieber, Chris Liu ; technical editor, Beth Friedman.  2016 1
Computer security -- Europe, Northern. : Digitalisation and human security : a multi-disciplinary approach to cybersecurity in the European High North / Mirva Salminen, Gerald Zojer, Kamrul Hossain, editors.  2020 1
Computer security -- European Union countries.   2
Computer security -- European Union countries -- Congresses. : Trustworthy eternal systems via evolving software, data and knowledge : second international workshop, EternalS 2012, Montpellier, France, August 28, 2012, revised selected papers / Alessandro Moschitti, Riccardo Scandariato (eds.).  2012 1
Computer security -- European Union countries -- Handbooks, manuals, etc.   2
Computer security -- Evaluation.   12
Computer security -- Evaluation -- Methodology.   3
Computer security -- Examinations.   4
Computer security -- Examinations -- Practice. : Professional penetration testing : creating and operating a formal hacking lab / by Thomas Wilhelm.  2010 1
Computer security -- Examinations, questions, etc.   4
Computer security -- Examinations -- Study guides.   164
Computer security -- Fiction.   7
Computer security -- France. : Cybersecurity in France / Philippe Baumard.  2017 1
Computer security -- Germany. : Cybersecurity in Germany / Martin Schallbruch, Isabel Skierka.  2018 1
Computer security -- Government policy.   6
Computer security -- Government policy -- Caribbean Area. : Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kathleen Vaughan and Liliana Besosa.  2017 1
Computer security -- Government policy -- Latin America. : Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kathleen Vaughan and Liliana Besosa.  2017 1
Computer security -- Government policy -- United States.   145
Computer security -- Government policy -- United States -- Congresses. : A head start on assurance : proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness, March 21-23, 1994, George Washington Inn, Williamsburg, Virginia / edited by Marshall D. Abrams, and Patricia R. Toth.  1994 1
Computer security -- Government policy -- United States -- Evaluation.   15
Computer security -- Government policy -- United States -- Handbooks, manuals, etc. : DoD program manager's guidebook for integrating the Cybersecurity Risk Management Framework (RMF) into the system acquisition lifecycle.  2015 1
Computer security -- Graphic methods -- Congresses.   5
Computer security -- Handbooks, manuals, etc.   28
Computer security -- Hungary -- Management. : Critical infrastructure protection research : results of the first critical infrastructure protection research project in Hungary / Laszlo Nadai, Jozsef Padanyi, editors.  2016 1
Computer security -- India.   2
Computer security -- India -- Case studies. : Managing information security on a shoestring budget / Varadharajan Sridhar and Bharat Bhasker.  2003 1
Computer security -- Industrial applications -- United States.   2
Computer security -- Information services. : Roadmap to NIST information security documents.  2006 1
Computer security -- Information technology.   3
Computer security -- Insurance -- United States. : The role of cyber insurance in risk management : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, March 22, 2016.  2016 1
Save Marked Save All
   « Prev Next »

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team