Review selected library titles related to cybersecurity and computer crimes at LSC-CyFair Branch Library. Click the title of a listed item, select the "Request" button in the listing, and enter your library card number and PIN for each title you want to reserve for pick up at the library.
Use these subject words and phrases to find more in the library catalog:
- business data security
- computer crimes
- computer hackers
- computer networks security
- computer security
- data protection
- information technology security
- Internet security
call number: 005.8 Eas
"Beginning with a general introduction to computer security, the volume covers topics such as Internet fraud and abuse, denial of service attacks, malware, hacking techniques, industrial espionage, encryption, developing security policies, network penetration testing, and basic computer forensics techniques. . .Easttom is a certified IT professional and the author of several books on computer and networking topics." - publishers summary \excerpt
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare by Joel Brenner - Penguin, 2011.
call number: 364.168 Bre
"Brenner, a former inspector general for the National Security Agency, raises the alarm about inadequately addressed threats and vulnerabilities to computer and communications systems. This problem has been addressed by administrations unsuccessfully since the 1980s and Brenner believes more needs to be done soon. This alarming account by an expert is worthy of serious attention from policy makers and average readers alike." - Publishers Weekly review excerpt
Cybersecurity: Public Sector Threats and Responses
by Kim J. Andreasson- CRC, 2012. call number: EBSCO eBook Collection Database (see title link to access book)
"Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve." - publishers summary excerpt