This is the "General Security Topics" page of the "Computer Security" guide.
Alternate Page for Screenreader Users
Skip to Page Navigation
Skip to Page Content

Computer Security  

Last Updated: Aug 26, 2016 URL: http://libguides.library.ncat.edu/computersecurity Print Guide RSS Updates

General Security Topics Print Page
  Search: 
 
 

Logging In

For all online resources, when logging in from off campus:
Use your username and password that you use to log into Blackboard or your email.

 

Books to Check Out from the Library

Computer security and penetration testing
Call Number: A&T STACKS TK5105.59 .B366 2008

Data warehousing and data mining techniques for cyber security
Call Number: A&T STACKS QA76.9.A25 S563 2007

Digital privacy : theory, technologies, and practices
Call Number: A&T STACKS QA76.9.A25 D528 2008

Guide to firewalls and network security : intrusion detection and VPNs
Call Number: A&T STACKS TK5105.59 .G85 2009

Guide to strategic infrastructure security : becoming a security network professional
Call Number: A&T STACKS TK5105.59 .W417 2009

Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
Call Number: A&T STACKS QA76.9.A25 B725 2008

Internet security : hacking, counterhacking, and society
Call Number: A&T STACKS TK5105.875.I57 I574 2007

Practical embedded security : building secure resource-constrained systems
Call Number: A&T STACKS TK7895.E42 S735 2008

Professional ASP.NET 3.5 security, membership, and role management with C# and VB
Call Number: A&T STACKS QA76.9.A25 H344 2009

Schneier on security
Call Number: A&T STACKS QA76.9.A25 S35145 2008

Secure software development : a security programmer's guide
Call Number: A&T STACKS QA76.76.D47 G773 2008

Security administrator street smarts : a real world guide to CompTIA Security+ skills
Call Number: A&T STACKS QA76.3 .M562 2009

Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
Call Number: A&T STACKS TK5102.85 .B88 2008

Security and quality of service in ad hoc wireless networks
Call Number: A&T STACKS TK5105.77 .M57 2008

Security engineering : a guide to building dependable distributed systems
Call Number: A&T STACKS QA76.9.A25 A54 2008

Security in wireless mesh networks
Call Number: A&T STACKS TK5103.2 .S44 2009

Security of information and communication networks
Call Number: A&T STACKS TK5105.59 .K37 2009

Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
Call Number: A&T STACKS QA76.9.V5 V5778 2009

Search for Articles

These databases are the top places to start searching for security topics:

  • ABI/Inform Global
    This business research site includes journals on MIS and computer technology management topics such as system and security planning.
  • ACM Digital Library
    Journal and newspaper articles and conference proceedings from the Association for Computing Machinery.
  • IEEE Xplore
    Full-text access to IEEE (Institute of Electrical and Electronics Engineers) transactions, journals, magazines and conference proceedings published since 1988. These include a wide range of topics in electrical, computer, and systems engineering.
 

ebooks

Cover Art
CCNA Cisco Certified Network Associate Security Study Guide (Exam 640-553) - Richard Deal
Note: The first time you log in to the Books24x7 ebook platform for this book it will take you to a general listing instead of the exact title.

Cover Art
CompTIA Security+ All-In-One Exam Guide, Second Edition
Note: The first time you log in to the Books24x7 ebook platform for this book it will take you to a general listing instead of the exact title.

Cover Art
CompTIA Security+ Review Guide - James Michael Stewart
Note: The first time you log in to the Books24x7 ebook platform for this book it will take you to a general listing instead of the exact title.

Cover Art
Computer and Information Security Handbook
Note: The first time you log in to the Books24x7 ebook platform for this book it will take you to a general listing instead of the exact title.


Cover Art
CSSLP Prep Guide: Mastering the Certified Secure Software Lifecycle Professional - Ronald L. Krutz and Alexander J. Fry
Note: The first time you log in to the Books24x7 ebook platform for this book it will take you to a general listing instead of the exact title.

Cover Art
Executive MBA in Information Security - John J. Trinckes, Jr.
Note: The first time you log in to the Books24x7 ebook platform for this book it will take you to a general listing instead of the exact title.


Description

Loading  Loading...

Tip