Now showing items 1-2 of 2

    • Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices 

      Wittkop, Jeremy (2016)
      This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical ...
    • Cybersecurity Lexicon 

      Ayala, Luis (2016)
      This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and ...