IT and Cybersecurity

Updated February 10, 2026
Drag items up and down to your preferred order then select the "Save Order" button.
(ISC)2 CCSP Certified Cloud Security Professional official study guide
Chapple, Mike
Paper Book
The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by...
8 steps to better security : A simple cyber resilience guide for business
Crawley, Kim
Paper Book
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap...
Cloud computing for dummies
Kirsch, Daniel
Paper Book
Get your head--and your business--into the Cloud  Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it's become a real and important part of our information...
ISC2® CISSP® certified information systems security professional : official practice tests
Chapple, Mike
Paper Book
Full-length practice tests covering all CISSP domains for the ultimate CISSP prep The ISC2 CISSP Official Practice Tests is a major resource for ISC2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions....
Networking for Dummies
Lowe, Doug
Paper Book
Set up a secure network at home or the office  Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage...
Penetration Testing for Dummies
Shimonski, Robert
Paper Book
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a...

Library staff! You can create and contribute to lists. Contact your catalog administrator or log in here.