Skip to main content

RPL Search

Search Results: 4
Book jacket
—Finney, George, author.
2022

Book

"In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist U...
Book jacket
Book jacket
—Woodhouse, Kimberley, 1973- author.
2023

Large Print

"In her new role as Emergency Operations Center director for Fairbanks, Alaska, Darcie Phillips prevents disasters. But none of her training can prepa...
Book jacket
—Minder, Kurtis, author.
2025

Book

In Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation, 30-year cybersecurity veteran Kurtis Minder delivers a fascinating exploration...

Sorry, we couldn’t find any results matching ""Computer security -- Management.""

Suggestions:

  • If you aren’t sure what spelling or term to use, type in only part of the word. The system will find results that contain those letters.
  • Be sure to try any variant spellings of words. i.e. color vs. colour
  • Instead of searching for the plural form of a word, try the singular.
  • Try using fewer filters.
Search Results: 2

Cyber Safety and Digital Awareness

… the internet and social media sites, in order to minimize security and personal safety risks. Whether you are using a computer or mobile device at the library or at home, this … of our locations through approximately 190 public access computers and Wi-Fi service. We value your personal privacy …

Safe Use and Conduct Bylaw

… and (c) all other matters and things connected with the management of the library and with the management of all … Library policies and the direction of library staff and security personnel. 2.0  No one shall intimidate, harass, or … vandalism, make an unauthorized intrusion into a library computer or a network, or mutilate, or destroy library …
Accessibility Preferences
Adjust Font Size
Default
Adjust Contrast
Change Font Style
My Account Services Search Location Barcode