Skip to Main Content

Cybersecurity & Information Assurance: Finding Books

Recent E-Books

Professionalizing the Nation's Cybersecurity Workforce?: Criteria for Decision-Making by National Research Council (U.S.) (2013)

Hands-on Ethical Hacking and Network Defense by Michael Simpson (2012)

The Defender's Dilemma: Charting a Course Toward Cybersecurity by Martin Libicki, Tim Webb, and Lillian Ablon (2015)

U.S. National Cybersecurity: Strategic Challenges and Opportunities by Grace Powers (2014)

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues by David Clark, Thomas Berson, and Lin Herbert (2014)

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Jason Andress and Steve Winterfeld (2014)

CyberWar, CyberTerror, CyberCrime and CyberActivism: an In-depth Guide to the Role of Standards in Cybersecurity Environment by Julie Mehan (2014)

Cybersecurity: Public Sector Threats and Responses by Kim Andreasson (2012)

Handbook of Cyber and Industrial Warfare by Katheleen Marlowe and Kena Wirth (2012)

Cyber Security Essentials by James Graham, Richard Howard, and Ryan Olson (2011)

Cyber Warfare and the Laws of War by Heather Harrison Dinniss (2012)

Handbook on Securing Cyber-physical Critical Infrastructure by Nan Zhang, Krishna Kant, and Sajal Das (2012)

Data Mining and Machine Learning in Cybersecurity by Sumeet Dua and Xian Du (2011)

Access Contested: Security, Identity, & Resistance in Asian Cyberspace by Ronald Deibert (2012)

Advances in Computer Security by Paola Lea (2012)

Communications & Security in Computer Science: (Concepts & Applications) by Prudence Vick (2012)

Information Security Management Handbook by Harold Tipton and Micki Nozaki (2012)

Security Engineering & Secure Communications by Jae Gomes and Dianna Popp (2012)

Advanced Penetration Testing for Highly-secured Environments: The Ultimate Security Guide by Lee Allen (2012)

The Tangled Web: A Guide to Securing Modern Web Applications by Michal Zalewski (2012)

Network Security: A Decision and Game-theoretic Approach by Tansu Alpcan and Tamer Basar (2011)

Data Protection From Insider Threats by Elisa Bertino (2012)

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods by Mark Merkow and Lakshmikanth Raghavan (2012)

Information Risk Management by Earle Littlejohn (2012)

Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development by David Kleidermacher and Mike Kleidermacher (2012)

The 7 [Seven] Qualities of Highly Secure Software by Mano Paul (2012)

Information Privacy (Concepts & Applications) by Kylan Courtney (2012)

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics by John Sammons (2012)

Cloud Security: A Comprehensive Guide to Secure Cloud Computing by Ronald Krutz and Russell Vines (2010)

Internet and Surveillance: The Challenges of Web 2.0 and Social Media by Christian Fuchs (2012)

Software Safety and Security: Tools for Analysis and Verification by Tobias Nipkow, Orna Grumberg, and Benedikt Hauptmann (2012)

Role Mining in Business: Taming Role-based Access Control Administration by Alessandro Colantonio, Roberto Di Pietro, and Alberto Ocello (2012)

Strategic Responses to Crime: Thinking Locally, Acting Globally by Melchor De Guzman, Aiedeo Das, and Dilip Das (2012)

Global Organized Crime: A Reference Handbook by Mitchel Roth (2010)

Google Books

Google digitizes millions of books.  BUT access is mostly to limited previews.

Google Book Search

Interlibrary Loan

Register and Make Requests via Interlibrary Loan

Interlibrary loan (ILL) is a common service between libraries. When the Library doesn't own or have access to an item, we can often borrow it from another source. A few limitations exist, so please review the following links:

  • A quick video overview.
  • Libguide explaining ILL & ILLiad (ILL).

Additional questions? Item unavailable via ILL? Don't hesitate to contact us about alternate options.