Refine your search

Your search returned 2888 results.

Sort
Results
81. BOOKS
Amazon cover image
Image from Amazon.com
Cybersecurity for dummies / Joseph Steinberg. by Publisher: Hoboken, New Jersey : for dummies, ©2020
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9.A25 .S74 2020.

82. BOOKS
Amazon cover image
Image from Amazon.com
Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT / edited by Wiem Tounsi by Series: Networks and telecommunications seriesPublisher: London, UK : ISTE, Ltd. ; Hoboken, NJ : John Wiley & Sons, Inc., ©2019
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9 .A25 C93 2019.

83. BOOKS
Amazon cover image
Image from Amazon.com
Becoming an ethical hacker / Gary Rivlin by Series: Masters at work
Edition: First Simon & Schuster hardcover edition
Publisher: New York : Simon & Schuster, ©2019
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9.A25 R58 2019.

84. BOOKS
Amazon cover image
Image from Amazon.com
85. BOOKS
Amazon cover image
Image from Amazon.com
Selected readings in cybersecurity / edited by Young B. Choi. by Publisher: Newcastle upon Tyne, UK : Cambridge Scholars Publishing, ©2018
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9.A25 S458 2018.

86. BOOKS
Amazon cover image
Image from Amazon.com
Listening in : cybersecurity in an insecure age / Susan Landau. by Publisher: New Haven, [Conn.] ; London : Yale University Press, ©2017Copyright date: ©2017
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf K3264.C65 L38 2017.

87. BOOKS
Amazon cover image
Image from Amazon.com
88. BOOKS
Amazon cover image
Image from Amazon.com
The art of software security assessment [electronic resource] : identifying and preventing software vulnerabilities / by Mark Dowd, John McDonald, and Justin Schuh. by
Publication details: Indianapolis, Ind. : Addison Wesley Professional, 2006
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9.A25 D75 2006.

89. BOOKS
Amazon cover image
Image from Amazon.com
90. BOOKS
Amazon cover image
Image from Amazon.com
Cybersecurity Ops with bash : attack, defend, and analyze from the command line / Paul Troncone and Carl Albing by
Edition: First edition
Publisher: Sebastopol, CA : O'Reilly Media, ©2019
Other title:
  • Attack, defend, and analyze from the command line
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9 .A25 T736 2019.

91. BOOKS
Amazon cover image
Image from Amazon.com
Securing DevOps : security in the Cloud / Julien Vehent. by Publisher: Shelter Island, New York : Manning Publications Co., ©2018
Other title:
  • Security in the Cloud
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9 .A25 V44 2018.

92. BOOKS
Amazon cover image
Image from Amazon.com
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. by Publisher: Princeton : Princeton University Press, ©2017
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf Z103 .H75 2017.

93. BOOKS
Amazon cover image
Image from Amazon.com
Computer security : art and science / Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel. by
Edition: Second edition.
Publisher: Boston : Addison-Wesley, ©2019
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9 .A25 B56 2019.

94. BOOKS
Amazon cover image
Image from Amazon.com
95. BOOKS
Amazon cover image
Image from Amazon.com
Hacking : the art of exploitation / Jon Erickson. by
Edition: 2nd ed.
Publication details: San Francisco, CA : No Starch Press, ©2008
Online resources:
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9 .A25 E75 2008.

96. BOOKS
Amazon cover image
Image from Amazon.com
The ABA cybersecurity handbook : a resource for attorneys, law firms, and business professionals / [edited by] Jill D. Rhodes and Robert S. Litt. by
Edition: Second edition.
Publisher: Chicago, Illinois : ABA, Cybersecurity Legal Task Force, ©2018
Other title:
  • Cybersecurity handbook
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf KF318 .A7518 2018.

97. BOOKS
Amazon cover image
Image from Amazon.com
Threat modeling : designing for security / Adam Shostack. by Publisher: Indianapolis, IN : Wiley, ©2014Copyright date: ©2014
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9 .A25 S495 2014.

98. BOOKS
Amazon cover image
Image from Amazon.com
Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig. by
Publication details: San Francisco : No Starch Press, ©2012
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.76 .C68 S534 2012.

99. BOOKS
Amazon cover image
Image from Amazon.com
Big data analytics in cybersecurity / edited by Onur Savas, Julia Deng. by Series: Data analytics applicationsPublisher: Boca Raton : CRC Press, Taylor & Francis Group, ©2017Copyright date: ©2017
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9 .A25 B538 2017.

100. BOOKS
Amazon cover image
Image from Amazon.com
Collaborative cyber threat intelligence : detecting and responding to advanced cyber attacks on national level / [edited by] Florian Skopik. by Publisher: Boca Raton, FL : CRC Press, ©2018
Availability: Items available for loan: Alfaisal University (1)Location, call number: On Shelf QA76.9 .A25 C6146 2018.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu