IT and Cybersecurity

Updated February 10, 2026
Drag items up and down to your preferred order then select the "Save Order" button.
Cloud computing for dummies
Kirsch, Daniel
Paper Book
Get your head--and your business--into the Cloud  Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it's become a real and important part of our information...
CompTIA Cloud+ study guide : exam CV0-003
Piper, Ben (IT consultant)
Paper Book
In the newly revised Third Edition of CompTIA Cloud+ Study Guide: Exam CVO-003, expert IT Ben Piper delivers an industry leading resource for anyone preparing for the CompTIA Cloud+ certification and a career in cloud services. The book introduces candidates to the skills and the...
Mastering Microsoft Teams : creating a hub for successful teamwork in Office 365
Wheeler, Christina
Paper Book
Get the most out of Microsoft Teams with this comprehensive and insightful resource  Mastering Microsoft Teams: Creating a Hub for Successful Teamwork in Office 365 shows readers how to communicate intelligently and effectively within Microsoft's powerful...
Net zeros and ones : how data erasure promotes sustainability, privacy, and security
Stiennon, Richard 1959-
Paper Book
Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished industry veterans delivers a comprehensive guide to managing permanent and...
Networking for Dummies
Lowe, Doug
Paper Book
Set up a secure network at home or the office  Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage...
Penetration Testing for Dummies
Shimonski, Robert
Paper Book
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a...

Library staff! You can create and contribute to lists. Contact your catalog administrator or log in here.