Skip to Main Content
Bellevue University
LibGuides
Library
MSSM
E-Books
Search this Guide
Search
MSSM: E-Books
Home
MSSM 501
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 506
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 517
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 523
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 602
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 607
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 618
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 624
Toggle Dropdown
E-Books
Journal Articles
Videos
Additional Resources
Libguide Curator
Lorraine Patrick
Email Me
Schedule Appointment
Contact:
Bellevue University
Freeman/Lozier Library
1000 Galvin Rd. S.
402-557-7313
MSSM 602 E-Books (Principles and Theories of Security Management)
Advances in security information management: Perceptions and outcomes.
by
Palomar, E. & Suarez de Tangil, G.
Hauppauge, NY: Nova Science Publishers, Inc. 2013.
Community-based urban violence prevention: Innovative approaches in Africa, Latin America, Asia and the Arab Region.
by
Mathey, K. & Matuk, S.
Bielefeld, Germany (2015).
Cyber-risk management
by
Stolen, K. & Refsdal, A.
Springer, (2015).
Designing and building a security operations center.
by
Nathans, D.
Waltham, MA. (2015).
Industrial security.
by
Russel, D L & Arlow, P C
Hoboken, NJ: Wiley, 2015.
Information warfare.
by
Ventre, D.
Hoboken, NJ: Wiley, 2016.
Introduction to security.
by
Fischer, R. & Halibozek, E.
New York: Elsevier (2013).
Learning nessus for penetration testing: Master how to perform IT infrastructure security vulnerability assessments using nessus with tips and insights from real-world challenges faced during vulnerability assessment.
by
Kumar, H.
Birmingham, U.K: Packt Publishing. (2014).
Managing information security
by
Vacca, J.R.
Waltham, MA: Syngress. 2014
Penetration testing: A hands-on introduction to hacking.
by
Weidman, G. & Eeckhoutte, P.V.
San Francisco, CA: No Starch Press. (2014).
Professional penetration testing: Creating and learning in a hacking lab.
by
Wilhelm, T.
Burlington: Syngress. 2013
Risk analysis and the security survey.
by
Broder, J. F. and Tucker, E.
Waltham, MA:Butterworth-Heinemann, 4th ed. (2012).
The science and technology of counterterrorism.
by
Young, C.
Waltham, MA. (2015).
<<
Previous:
MSSM 602
Next:
Journal Articles >>