Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 9
- Security measures 9
- Electronic data processing departments 6
- Access control 4
- Computers 3
- Computer viruses 2
- Computer Science 1
- Computer crimes 1
- Computer networks 1
- Computer science 1
- Cryptography 1
- Data protection 1
- Firewall (Computer security) 1
- Firewalls (Computer securities) 1
- Forensic sciences 1
- Handbooks, manuals, etc 1
- Information technology 1
- Internet (Computer network) 1
- Management 1
- Management information systems 1
- Microcomputer 1
- Microcomputers 1
- Risk 1
- Telecommunication 1
-
1
Computer Security
Published 2002-12-01“… This guide is intended to present a selected list of sites that cover the basic issues of computer security and which provide useful information for the non-expert (librarian, undergraduate student, office manager, etc.) who wants to learn more about this increasingly important subject. …”
Get full text
Article -
2
-
3
-
4
-
5
-
6
-
7
Virtual Cloud Laboratories in Training of Specialists of the Direction “Computer Security”
Published 2015-12-01Get full text
Article -
8
19 deadly sins of software security : programming flaws and how to fix them /
Published 2005Subjects: “…Computer security.…”
Get full text
Book -
9
A New Fingerprint Authentication Scheme based on Secret-splitting for Cloud Computing Security
Published 2011Get full text
Electronic Book Chapter -
10
Firewalls and internet security : repelling the wily hacker /
Published 2003Subjects: “…Firewall (Computer security).…”
Book -
11
Computers under attack : intruders, worms, and viruses /
Published 1990Subjects: “…Computer security.…”
Book -
12
Cyberpunk : outlaws and hackers on the computer frontier /
Published 1991Subjects: “…Computer security.…”
Book -
13
UNIX system security : how to protect your data and prevent intruders /
Published 1991Subjects:Book -
14
-
15
IT SECURITY MANAGEMENT IN SMALL AND MEDIUM ENTERPRISES
Published 2017-12-01Subjects: “…computer security…”
Get full text
Article -
16
Computer forensics : incident response essentials /
Published 2002Subjects: “…Computer security.…”
Book -
17
-
18
Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion
Published 2025-01-01Subjects: “…Computer security…”
Get full text
Article -
19
-
20
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: “…Cloud Computing Security…”
Get full text
Article