Return to home page
Searching: all OPAL Libraries
Beginning March 11 through April 30, all OPAL requests must be picked up at the owning institution, as the statewide delivery service is transitioned to a new provider. During the transition, OhioLINK and SearchOhio requesting will be unavailable. Please contact your library with questions or advice about alternative resources.
     

   
Save Marked Save All
Num   SUBJECTS (1-50 of 225) Year Entries
6077 Found
1   Computer security -- 11 Related Subjects   11
2 Computer security.   2507
3 Computer security -- 21st century. : Cloud native software security handbook : unleash the power of cloud native tools for robust security in modern applications / Mihir Shah.  2023 1
4 Computer security -- Abbreviations. : System and network security acronyms and abbreviations / Karen Scarfone, Victoria Thompson.  2009 1
5 Computer security -- Abbreviations -- Standards. : Specification for asset identification 1.1 / John Wunder, Adam Halbardier, David Waltermire.  2011 1
6 Computer security -- Access control.   2
7 Computer security -- Acronyms. : System and network security acronyms and abbreviations / Karen Scarfone, Victoria Thompson.  2009 1
8 Computer security -- Acronyms -- Standards. : Specification for asset identification 1.1 / John Wunder, Adam Halbardier, David Waltermire.  2011 1
9 Computer security -- Arctic regions. : Cybersecurity and resilience in the Arctic / edited by Benjamin D. Trump, Kamrul Hossain and Igor Linkov.  2020 1
10 Computer security -- Asia. : Access contested : security, identity, and resistance in Asian cyberspace information revolution and global politics / edited by Ronald Deibert [and 3 others].  2012 1
11 Computer security -- Auditing. : Assessing information security : strategies, tactics, logic and framework / A. Vladimirov, K. Gavrilenko, A. Michajlowski.  2010 1
12 Computer security -- Auditing -- Vocational guidance. : Information security auditor / Wendy Goucher.  2016 1
13 Computer security -- Automation -- Government policy -- United States.   2
14 Computer security -- Automation -- Standards -- United States. : Specification for the asset summary reporting format 1.0 (draft) / Mark Davidson, Adam Halbardier, David Waltermire.  2012 1
15 Computer security -- Awards -- United States.   2
16 Computer security -- Belize. : Belize cybersecurity regulation, supervision, and resilience Tamas Gaidosch and Filip Caron  2020 1
17 Computer security -- Bibliography.   2
18 Computer security -- California -- Laguna Niguel.   2
19 Computer security -- California -- Laguna Niguel -- Evaluation. : Technical security evaluation of U.S. Customs and Border Protection activities at the Chet Holifield Federal Building (redacted) / Department of Homeland Security, Office of Inspector General.  2008 1
20 Computer security -- Caribbean Area. : Caribbean energy sector cybersecurity forum : modernizing and securing the grid.  2022 1
21 Computer security -- Caribbean Area -- Evaluation. : Cybersecurity in Latin America and the Caribbean : the state of readiness for the defense of cyberspace / Dr. Boris Saavedra.  2015 1
22 Computer security -- Case studies.   13
23 Computer security -- Certification -- Study guides. : Certified Kubernetes security specialist (CKS) course.  2022 1
24 Computer security -- China.   4
25 Computer security -- China -- Congresses. : China internet development report 2018 : Blue Book of World Internet Conference / Chinese Academy of Cyberspace Studies.  2020 1
26 Computer security -- Computer programs.   12
27 Computer security -- Computer simulation. : Multilevel modeling of secure systems in QoP-ML / author, Bogdan Ksiezopolski.  2015 1
28 Computer security -- Congresses.   1450
29 Computer security -- Data processing.   4
30 Computer security -- Data processing -- Congresses. : Intelligence and security informatics : international workshop, WISI 2006, Singapore, April 9, 2006 : proceedings / Hsinchun Chen [and others] (eds.).  2006 1
31 Computer security -- Decision making. : Data analytics and decision support for cybersecurity : trends, methodologies and applications / Ivan Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang, editors.  2017 1
32 Computer security -- Design and construction.   3
33 Computer security -- Developing countries.   2
34 Computer security -- Developing countries -- Case studies. : Critical perspectives on cybersecurity : feminist and postcolonial interventions / edited by Anwar Mhajne and Alexis Henshaw.  2024 1
35 Computer security -- Dictionaries.   4
36 Computer security -- Dictionaries -- Polyglot. : Elsevier's dictionary of information security in English, German, French and Russian / compiled by G. Manoilov and B. Radichkova.  2007 1
37 Computer security -- Drama.   3
38 Computer security -- Economic aspects.   4
39 Computer security -- Economic aspects -- Congresses. : Economics of information security and privacy III / Bruce Schneier, editor.  c2013 1
40 Computer security -- Economic aspects -- Risk management. : Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions / Paul Rohmeyer and Jennifer L. Bayuk ; foreword by Dr. Larry Ponemon.  2019 1
41 Computer security -- Employees -- Recruiting -- Government policy -- United States.   3
42 Computer security -- Employees -- Recruiting -- United States.   4
43 Computer security -- Employees -- Training of.   2
44 Computer security -- Employees -- Training of -- Government policy -- United States.   3
45 Computer security -- Employees -- Training of -- United States.   6
46 Computer security -- Encyclopedias. : Encyclopedia of cryptography and security / Henk C.A. van Tilborg, Sushil Jajodia (eds.).  2011 1
47 Computer security -- Equipment and supplies. : Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / Roger Dube.  2008 1
48 Computer security equipment industry.   3
49 Computer security equipment industry -- Certification. : CISSP For Dummies, 6th Edition / Miller, Lawrence.  2018 1
50 Computer security equipment industry -- Corrupt practices. : "Free security scan" could cost time and money.  2008 1
Save Marked Save All
Locate in results
   

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team