IT and Cybersecurity

Updated February 10, 2026
Drag items up and down to your preferred order then select the "Save Order" button.
(ISC)2 CCSP Certified Cloud Security Professional : Official Study Guide
Chapple, Mike.
Paper Book
The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by...
(ISC)2 CISSP Certified Information Systems Security Professional: Official Study Guide
Chapple, Mike
Paper Book
The only Official CISSP Study Guide - fully updated for the 2021 CISSP Body of Knowledge (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This...
Cloud computing for dummies
Kirsch, Daniel
Paper Book
Get your head--and your business--into the Cloud  Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it's become a real and important part of our information...
Cybersecurity and Third-Party Risk : Third-Party Threat Hunting
Rasner, Gregory C.
Paper Book
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile...
Deep learning : from big data to artificial intelligence with R
Tuffery, Stéphane S.
Ebook
DEEP LEARNING A concise and practical exploration of key topics and applications in data science In Deep Learning: From Big Data to Artificial Intelligence with R, expert researcher Dr. Stéphane Tufféry delivers an insightful discussion of the applications of...
Designing data visualizations
Iliinsky, Noah P. N.
Paper Book
Data visualization is an efficient and effective medium for communicating large amounts of information, but the design process can often seem like an unexplainable creative endeavor. This concise book aims to demystify the design process by showing you how to use a linear decision-making process...
ISC2 CISSP certified information systems security professional: Official practice tests
Chapple, Mike
Paper Book
Full-length practice tests covering all CISSP domains for the ultimate exam prep The (ISC)2 CISSP Official Practice Tests is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions. The first...
Linux security fundamentals
Clinton, David (IT specialist)
Paper Book
Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity...
Mastering Microsoft Teams : Creating a Hub for Successful Teamwork in Office 365
Wheeler, Christina.
Paper Book
Get the most out of Microsoft Teams with this comprehensive and insightful resource  Mastering Microsoft Teams: Creating a Hub for Successful Teamwork in Office 365 shows readers how to communicate intelligently and effectively within Microsoft's powerful...
Data Sanitization : A Complete Guide to Managing Data Erasure
Stiennon, Richard.
Paper Book
Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished industry veterans delivers a comprehensive guide to managing permanent and...
Networking for Dummies
Lowe, Doug
Paper Book
Set up a secure network at home or the office  Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage...
Penetration Testing for Dummies
Shimonski, Robert
Paper Book
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a...
Project Zero Trust : A Story about a Strategy for Aligning Security and the Business
Finney, George.
Paper Book
Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero...

Library staff! You can create and contribute to lists. Contact your catalog administrator or log in here.