Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Computer security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Computer security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Computer security"
Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Der volle Inhalt der QuelleKubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.
Der volle Inhalt der QuelleSchmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.
Der volle Inhalt der QuelleAlkandary, Yaquob H. A., and Eng Fawzyeya M. A. Alhallaq. "Computer Security." IJARCCE 5, no. 1 (2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.
Der volle Inhalt der QuelleWhite, Richard. "Computer Security." Urologic Clinics of North America 13, no. 1 (1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.
Der volle Inhalt der QuelleLincoln, Alan Jay. "Computer Security." Library & Archival Security 11, no. 1 (1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.
Der volle Inhalt der QuelleGlīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.
Der volle Inhalt der QuelleMercuri, Rebecca T. "Computer security." Communications of the ACM 45, no. 10 (2002): 11–14. http://dx.doi.org/10.1145/570907.570917.
Der volle Inhalt der QuelleDwan, Berni. "Computer security." Computer Fraud & Security 1999, no. 10 (1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.
Der volle Inhalt der QuelleLandwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (2001): 3–13. http://dx.doi.org/10.1007/s102070100003.
Der volle Inhalt der QuelleDissertationen zum Thema "Computer security"
Anderson, Ross John. "Robust computer security." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.
Der volle Inhalt der QuellePohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.
Der volle Inhalt der QuelleBurchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Der volle Inhalt der QuelleBesada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.
Der volle Inhalt der QuelleMemon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Der volle Inhalt der QuelleTaramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.
Der volle Inhalt der QuelleSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Der volle Inhalt der QuelleLomas, Thomas Mark Angus. "Aspects of computer network security." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241051.
Der volle Inhalt der QuelleSoewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Der volle Inhalt der QuelleLi, QianQian. "Human-Computer Interaction: Security Aspects." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427166.
Der volle Inhalt der QuelleBücher zum Thema "Computer security"
Pamela, Kane, ed. Compute!'s computer security. Compute! Books, 1989.
Den vollen Inhalt der Quelle findenW, Roberts D. Computer security. Blenheim Online Publications, 1990.
Den vollen Inhalt der Quelle findenHollmann, Pauline. Computer security. Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Den vollen Inhalt der Quelle findenKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Der volle Inhalt der QuelleKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Der volle Inhalt der QuelleFournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Der volle Inhalt der QuelleLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Der volle Inhalt der QuelleLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Der volle Inhalt der QuelleBoureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Der volle Inhalt der QuelleKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Der volle Inhalt der QuelleBuchteile zum Thema "Computer security"
Parker, Carey. "Computer Security." In Firewalls Don't Stop Dragons. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6189-7_5.
Der volle Inhalt der QuelleParker, Carey. "Computer Security." In Firewalls Don't Stop Dragons. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3852-3_5.
Der volle Inhalt der QuelleWilson, Kevin. "Computer Security." In Everyday Computing with Windows 8.1. Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0805-2_24.
Der volle Inhalt der QuelleSchneier, Bruce. "Computer Security." In Secrets and Lies. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch8.
Der volle Inhalt der QuelleHelfrich, James. "Computer Security." In Security for Software Engineers. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-2.
Der volle Inhalt der QuelleDuffany, Jeffrey L. "Computer Security." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_1.
Der volle Inhalt der QuelleBell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "Computer Security." In Cybersins and Digital Good Deeds. CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-17.
Der volle Inhalt der QuelleCrutcher, Paul D., Neeraj Kumar Singh, and Peter Tiegs. "Computer Security." In Essential Computer Science. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7107-0_6.
Der volle Inhalt der QuelleAshley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.
Der volle Inhalt der QuelleLefebvre, E. "Computer Network Security." In Multisensor Fusion. Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Computer security"
Lin, Hongkai. "Computer network information security monitoring system." In Second International Conference on Big Data, Computational Intelligence and Applications (BDCIA 2024), edited by Sos S. Agaian. SPIE, 2025. https://doi.org/10.1117/12.3059895.
Der volle Inhalt der QuelleHowerton, Paul W. "Computer security." In the 1985 ACM annual conference. ACM Press, 1985. http://dx.doi.org/10.1145/320435.320579.
Der volle Inhalt der QuelleValentine, David W. "Practical computer security." In the 6th conference. ACM Press, 2005. http://dx.doi.org/10.1145/1095714.1095758.
Der volle Inhalt der QuelleNanda, Priyadarsi, and Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)." In IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. ACM, 2010. http://dx.doi.org/10.1145/3258155.
Der volle Inhalt der QuelleTurner, Claude F., Blair Taylor, and Siddharth Kaza. "Security in computer literacy." In the 42nd ACM technical symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1953163.1953174.
Der volle Inhalt der Quelle"Computer networks and security." In 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004. IEEE, 2004. http://dx.doi.org/10.1109/inmic.2004.1492922.
Der volle Inhalt der QuelleGuizani, M., and Hsiao-Hwa Chen. "Computer & network security." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1578354.
Der volle Inhalt der QuelleCampbell, Marlene. "Ethics and computer security." In the 1988 ACM sixteenth annual conference. ACM Press, 1988. http://dx.doi.org/10.1145/322609.322781.
Der volle Inhalt der Quelle"Computer security acquisition management." In 2nd Aerospace Computer Security Conference. American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2774.
Der volle Inhalt der QuelleCostello, Joanne. "Security on computer networks." In the 19th annual ACM SIGUCCS conference. ACM Press, 1991. http://dx.doi.org/10.1145/122898.122906.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Computer security"
Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.
Der volle Inhalt der QuelleSECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada404996.
Der volle Inhalt der QuelleTodd, Mary Anne, and Constance Guitian. Computer security training guidelines. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.
Der volle Inhalt der QuelleBerg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1034885.
Der volle Inhalt der QuelleFaculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.
Der volle Inhalt der QuelleSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.
Der volle Inhalt der QuelleBergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203261.
Der volle Inhalt der QuelleGuttman, Barbara, and Edward Roback. An introduction to computer security :. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.
Der volle Inhalt der QuelleRoback, Edward. Glossary of computer security terminology. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4659.
Der volle Inhalt der QuelleSkandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.
Der volle Inhalt der Quelle