For electronic reserves…

For electronic reserves…

Homewood Patrons may access electronic reserves from: Eisenhower Course Readings

SAIS Patrons may access electronic reserves from their course pages in Blackboard

Welch Patrons may access electronic reserves from: Welch E-Reserves

Patrons with questions regarding access to electronic reserves should email or speak to their home library.

Reserves

Cybersecurity Sp 18

Rid, Thomas
SAIS Reserve Library
Number of results to display per page
Bruce Schneier. 2015 .

Schneier, Bruce, 1963-

"This special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published." -- Book jacket. New introduction by the author.
  • SAIS Reserve Stacks
    QA76.9 .A25 S36 2015
    Available
Simon Singh. 1999 .

Singh, Simon

  • Eisenhower C Level
    Z103.S56 1999 c. 1
    Checked out
    Checked out, Due: Mar 28 2018
    Another patron is currently using this item. Use BorrowDirect to request a different copy. For additional help, ask a library staff member.
  • SAIS Reserve Stacks
    Z103 .S56 1999
    Available
David Kahn. 1996 .

Kahn, David, 1930-

Kahn traces history of codes and ciphers from the dawn of civilization and details their influence on war, commerce, diplomacy, and espionage.
4. Critical Infrastructure Protection Book , Online in English
edited by Eric Goetz, Sujeet Shenoi. 2008 .

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food,…
Steven Levy. 2002 .

Levy, Steven.

Loner -- Standard -- Public Key -- Prime Time -- Selling Crypto -- Patents and Keys -- Crypto Anarchy -- Clipper Chip -- Slouching Toward Crypto -- Epilogue: The Open Secret.
  • SAIS Reserve Stacks
    QA76.9 .A25 L49 2002
    Available
Ladislav Bittman. 1972 .

Bittman, Ladislav, 1931-

1. Secret games -- 2. Operation Neptune -- 3. Scapegoat for the world's troubles -- 4. Big Brother -- 5. Victim -- 6. The game continues.
  • SAIS Reserve Stacks
    UB251 .C95 B58 1972
    Available
Michael Bazzell 2018 .

Bazzell, Michael,

"Author Michael Bazzell has been well known in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout…
  • SAIS Reserve Stacks
    JF1525 .I6 B39 2018
    Available
  • SAIS Reserve Stacks
    JF1525 .I6 B39 2018 c. 2
    Available
Michael Bazzell. 2016 .

Bazzell, Michael,

This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside…
  • SAIS Reserve Stacks
    JF1525 .I6 B39 2016
    Available
by Richard Bejtlich. 2013 .

Bejtlich, Richard.

This title teaches IT and security staff how to leverage powerful network security monitoring tools and concepts to identify threats quickly and effectively.
  • SAIS Reserve Stacks
    TK5105.59 .B44 2013
    Available
Ross J. Anderson. 2008 .

Anderson, Ross, 1956-

"The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy - and as they specialize, they get better. New applications, from…
  • Montgomery Library Resource Center
    QA76.9.A25 A54 2008 c. 1
    Available
  • Montgomery Library Resource Center
    QA76.9.A25 A54 2008 c. 2
    Available
  • SAIS Reserve Stacks
    QA76.9.A25 A53 2008
    Available