Auswahl der wissenschaftlichen Literatur zum Thema „Computer security“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Computer security" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Computer security"

1

Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.

Der volle Inhalt der Quelle
Annotation:
The author in this work provides insight into computer systems security. Themes which are discussed is hardware security, logical security, viruses and computer protection. Nowadays computers are a part of daily life, so each user how to know how to protect computer and its data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Schmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.

Der volle Inhalt der Quelle
Annotation:
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home. This article is a brief overview of some of the precautions that should be taken on a daily basis to protect your computer systems, files, data, and other pertinent information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Alkandary, Yaquob H. A., and Eng Fawzyeya M. A. Alhallaq. "Computer Security." IJARCCE 5, no. 1 (2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

White, Richard. "Computer Security." Urologic Clinics of North America 13, no. 1 (1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Lincoln, Alan Jay. "Computer Security." Library & Archival Security 11, no. 1 (1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Glīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.

Der volle Inhalt der Quelle
Annotation:
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mercuri, Rebecca T. "Computer security." Communications of the ACM 45, no. 10 (2002): 11–14. http://dx.doi.org/10.1145/570907.570917.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Dwan, Berni. "Computer security." Computer Fraud & Security 1999, no. 10 (1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Landwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (2001): 3–13. http://dx.doi.org/10.1007/s102070100003.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Computer security"

1

Anderson, Ross John. "Robust computer security." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Pohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Der volle Inhalt der Quelle
Annotation:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Besada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.

Der volle Inhalt der Quelle
Annotation:
This work consists on the design and implementation of a complete monitored security system. Two computers make up the basic system: one computer is the transmitter and the other is the receiver. Both computers interconnect by modems. Depending on the status of the input sensors (magnetic contacts, motion detectors and others) the transmitter detects an alarm condition and sends a detailed report of the event via modem to the receiver computer.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Memon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.

Der volle Inhalt der Quelle
Annotation:
<p>WLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.</p><p>This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.</p><p>We worked in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Taramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.

Der volle Inhalt der Quelle
Annotation:
The rapid growth of information and communication systems in recent years has brought with it an increased need for security. Meanwhile, encryption, which constitutes the basis of the majority of security schemes, may imply a significant amount of energy consumption. Encryption algorithms, depending on their complexity, may consume a significant amount of computing resources, such as memory, battery power and processing time. Therefore, low energy encryption is crucial, especially for battery powered and passively powered devices. Thus, it is of great importance to achieve the desired security
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Skaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Lomas, Thomas Mark Angus. "Aspects of computer network security." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241051.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Soewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Der volle Inhalt der Quelle
Annotation:
Thesis (Ph. D.)--Southern Illinois University Carbondale, 2009.<br>"Department of Electrical and Computer Engineering." Keywords: Adaptive security, Computer networks, Intrusion detection. Includes bibliographical references (p. 78-84). Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Li, QianQian. "Human-Computer Interaction: Security Aspects." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427166.

Der volle Inhalt der Quelle
Annotation:
Along with the rapid development of intelligent information age, users are having a growing interaction with smart devices. Such smart devices are interconnected together in the Internet of Things (IoT). The sensors of IoT devices collect information about users' behaviors from the interaction between users and devices. Since users interact with IoT smart devices for the daily communication and social network activities, such interaction generates a huge amount of network traffic. Hence, users' behaviors are playing an important role in the security of IoT smart devices, and the security a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Computer security"

1

Pamela, Kane, ed. Compute!'s computer security. Compute! Books, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

W, Roberts D. Computer security. Blenheim Online Publications, 1990.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hollmann, Pauline. Computer security. Science Reference Section, Science and Technology Division, Library of Congress, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Katsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Katsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Fournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Lopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Lopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Boureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Katsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Computer security"

1

Parker, Carey. "Computer Security." In Firewalls Don't Stop Dragons. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6189-7_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Parker, Carey. "Computer Security." In Firewalls Don't Stop Dragons. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3852-3_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Wilson, Kevin. "Computer Security." In Everyday Computing with Windows 8.1. Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0805-2_24.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Schneier, Bruce. "Computer Security." In Secrets and Lies. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Helfrich, James. "Computer Security." In Security for Software Engineers. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Duffany, Jeffrey L. "Computer Security." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Bell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "Computer Security." In Cybersins and Digital Good Deeds. CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-17.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Crutcher, Paul D., Neeraj Kumar Singh, and Peter Tiegs. "Computer Security." In Essential Computer Science. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7107-0_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ashley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Lefebvre, E. "Computer Network Security." In Multisensor Fusion. Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Computer security"

1

Lin, Hongkai. "Computer network information security monitoring system." In Second International Conference on Big Data, Computational Intelligence and Applications (BDCIA 2024), edited by Sos S. Agaian. SPIE, 2025. https://doi.org/10.1117/12.3059895.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Howerton, Paul W. "Computer security." In the 1985 ACM annual conference. ACM Press, 1985. http://dx.doi.org/10.1145/320435.320579.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Valentine, David W. "Practical computer security." In the 6th conference. ACM Press, 2005. http://dx.doi.org/10.1145/1095714.1095758.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Nanda, Priyadarsi, and Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)." In IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. ACM, 2010. http://dx.doi.org/10.1145/3258155.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Turner, Claude F., Blair Taylor, and Siddharth Kaza. "Security in computer literacy." In the 42nd ACM technical symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1953163.1953174.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

"Computer networks and security." In 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004. IEEE, 2004. http://dx.doi.org/10.1109/inmic.2004.1492922.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Guizani, M., and Hsiao-Hwa Chen. "Computer & network security." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1578354.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Campbell, Marlene. "Ethics and computer security." In the 1988 ACM sixteenth annual conference. ACM Press, 1988. http://dx.doi.org/10.1145/322609.322781.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

"Computer security acquisition management." In 2nd Aerospace Computer Security Conference. American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2774.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Costello, Joanne. "Security on computer networks." In the 19th annual ACM SIGUCCS conference. ACM Press, 1991. http://dx.doi.org/10.1145/122898.122906.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Computer security"

1

Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

SECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada404996.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Todd, Mary Anne, and Constance Guitian. Computer security training guidelines. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Berg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1034885.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Bergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203261.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Guttman, Barbara, and Edward Roback. An introduction to computer security :. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Roback, Edward. Glossary of computer security terminology. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4659.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Skandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!