Skip to Main Content

New Items: Information Technology Administration & Security

New Items at Seneca Libraries

Added to collection between January 1, 2024 - January 1, 2025

This is a partial list of eBooks, books, journals, and streaming videos that were selected by Seneca librarians this year. It is updated in January and June.

Please contact your liaison librarians for more information about collections for your academic area.

Recommendation for Library Purchase

Information Technology Administration & Security

Title Author Material Call Number Location
AI and machine learning for network and security management /
Wu, Yulei, author. eBook online
Auditing IT infrastructures for compliance /
Johnson, Rob author. (Robert), eBook online
Cloud computing : concepts, technology, security & architecture /
Erl, Thomas, author. Book QA76.585 .E75 2024 Newnham Campus Library
General Collection-Stacks
Corporate cybersecurity : identifying risks and the bug bounty program /
eBook online
Cryptography /
Louridas, Panos, author. eBook online
Cyber security in the age of artificial intelligence and autonomous weapons /
eBook online
Data science in cybersecurity and cyberthreat intelligence /
eBook online
Essentials of Computer Architecture /
Comer, Douglas. eBook online
Ethical hacking : techniques, tools, and countermeasures /
Solomon, Michael 1963- author. (Michael G.), eBook online
IT controlling : from IT cost and activity allocation to smart controlling /
Gadatsch, Andreas, author. eBook online
Information security planning : a practical approach /
Lincke, Susan, author. eBook online
Making IT sustainable techniques and applications.
GLOUKHOVTSEV, MIKHAIL. eBook online
Malware : handbook of prevention and detection /
eBook online
Managing and using information systems : a strategic approach /
Pearlson, Keri E., author. Book HD30.2 .P4 2024 Newnham Campus Library
General Collection-Stacks
Managing information technology /
Castillo, Francisco, author. eBook online
Modern C programming : including Standards C99, C11, C17, C23 /
Gazi, Orhan, author. eBook online
Optimal spending on cybersecurity measures : risk management /
eBook online
Project zero trust : a story about a strategy for aligning security and the business /
eBook online
Radical secrecy : the ends of transparency in datafied America /
Birchall, Clare, author. eBook online
Reshaping cybersecurity with generative AI techniques /
Jhanjhi, Noor Zaman, author. eBook online
Security strategies in Linux platforms and applications /
Messier, Ric, author. eBook online
SpaceX : Elon Musk and the final frontier /
Bergan, Brad, author. eBook online
The cybersecurity body of knowledge : the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum in cybersecurity /
Shoemaker, Dan, author. eBook online
The essentials of computer organization and architecture /
Null, Linda, author. eBook online
The geek way : the radical mindset that drives extraordinary results /
McAfee, Andrew, author. eBook online
The real internet architecture : past, present, and future evolution /
Zave, Pamela, 1948- author. eBook online
The rise of politically motivated cyber attacks : actors, attacks and cybersecurity /
eBook online
The technology procurement handbook : a practical guide to digital buying /
eBook online
The weakest link : how to diagnose, detect, and defend users from phishing /
Vishwanath, Arun, author. eBook online
The web we weave : why we must reclaim the Internet from moguls, misanthropes, and moral panic /
Jarvis, Jeff, 1954- author. eBook online
Tor : from the Dark Web to the future of privacy /
Collier, Ben, author. eBook online
UX writing : designing user-centered content /
Tham, Jason Chew Kit, 1990- author. eBook online
What we build with power : the fight for economic justice in tech /
Sentíes, David Delmar, author. eBook online