Searching for Books
Use the ESearch to search for books, ebooks, articles, and more in the library catalog. This search bar can also be found on the front page of the library website.
Additional materials on Information Assurance, Cyber Security, and Cyber Defense can be found using the following search in the library catalog:
Books 24x7 IT Pro is a suite of ebooks available to you through EMU Library. All of these books can be found in the library catalog, but can also be searched directly here:
-
Books 24x7 IT Pro This link opens in a new windowSubjects: Computing, Technology
Info type: full text ebooks
Access Tips: Only 3 users at a time. Login requires EMU NetID. See tips for using Books 24x7.
Books for Getting Started
-
-
-
-
Information Security by
ISBN: 9781849199766
Tools of the Trade
-
-
-
Engineering Secure and Dependable Software Systems by
ISBN: 9781614999768Publication Date: 2019-08-06 -
-
Case Studies
-
Information Security: Contemporary Cases
Subject(s): Computer security --Case studies. Computer networks --Security measures --Case studies.
Management
-
Information Security Architecture: An Integrated Approach to Security in the Organization
Subject(s): Computer security. Computer architecture. -
A Business Guide to Information Security: How to Protect your Company’s IT Assets, Reduce Risks and Understand the Law
Subject(s): Computer security. Information resources management --Security measures. Data protection. Business--Data processing--Security measures. -
Information Risk and Security: Preventing and Investigating Workplace Computer Crime
Contents: 1. Perception of Risk -- 2. Computer Fraud -- 3. IP Theft -- 4. Password Misuse -- 5. Trash Risk -- 6. Wireless Risk -- 7. Sabotage, Extortion Blackmail -- 8. Social Engineering -- 9. PC Risks -- 10. Pornography -- 11. Anonymous Letters -- 12. Press Leaks -- 13. Incident Response -- 14. Computer Evidence -- 15. Covert Investigation -- 16. Analytical Methods -- 17. Investigative Resources -- 18. Court -- 19. Exit Procedures -- 20. Epilogue -- 21. APPENDIX I CPA -- 22. APPENDIX 2 Computer Policy -- 23. APPENDIX 3 Search Orders -- 24. APPENDIX 4 Decision Matrix -- 25. APPENDIX 5 Security. -
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Subject(s): Computer security. Computer networks --Security measures. Management information systems. -
The Information Revolution, Information Warfare and National Security
-
Information Assurance: Trends in Vulnerabilities, Threats, and Technologies (Ebook)
Subject(s): Computer networks --Security measures. Data protection. Firewalls (Computer security). -
The Perils and Promise of Global Transparency: Why the Information Revolution may not Lead to Security, Democracy, or Peace
Contents: The Complexity of Transparency -- Transparency and Conflict -- Transparency and Intergroup Violence -- Transparency and Conflict Intervention -- Transparency and Governance -- Global Implications of Growing Transparency. -
Conquest in Cyberspace: National Security and Information Warfare
Call Number: U163 .L534 2007Contents: Introduction -- Hostile Conquest as Information Warfare -- Information Warfare as Noise -- Can Information Warfare Be Strategic -- Information Warfare against Command and Control -- Friendly Conquest in Cyberspace -- Friendly Conquest Using Global Systems -- Retail Conquest in Cyberspace -- From Intimacy, Vulnerability -- Talking Conquest in Cyberspace -- Managing Conquest in Cyberspace -- Appendix A: Why Cyperspace is Likely to Gain Consequence. -
Information Warfare: Separating Hype from Reality
Contents: Introduction -- Information Operations: The Policy and Organizational Evolution -- Perception Management: IO’s Stepchild -- Information Operations in the Global War on Terror: Lessons Learned from Operations in Afghanistan and Iraq -- Cyberterrorism: Hype and reality -- Information Operations Education: Lessons Learned from Information Assurance -- Information Operations and the Average Citizen -- A Tale of Two Cities: Approaches to Counterterrorism and Critical Infrastructure Protection in Washington, D.C. and Canberra -- Speaking Out of Both Sides of Your Mouth: Approaches to Perception Management in Washington, D.C. and Canberra -- Conclusion.
Test Prep
More test prep material can be found in Esearch (the Library Catalog) with a search for: Subject:"Computer security-Examinations-Study guides"
-
-
-
-
CEH Certified Ethical Hacker All-In-One Exam Guide, Fourth Edition by
ISBN: 9781260454550Publication Date: 2019-03-13 -