Zeitschriftenartikel zum Thema „Computer security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (June 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Der volle Inhalt der QuelleKubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.
Der volle Inhalt der QuelleSchmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (September 1, 2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.
Der volle Inhalt der QuelleAlkandary, Yaquob H. A., and Eng Fawzyeya M. A. Alhallaq. "Computer Security." IJARCCE 5, no. 1 (January 30, 2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.
Der volle Inhalt der QuelleWhite, Richard. "Computer Security." Urologic Clinics of North America 13, no. 1 (February 1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.
Der volle Inhalt der QuelleLincoln, Alan Jay. "Computer Security." Library & Archival Security 11, no. 1 (August 26, 1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.
Der volle Inhalt der QuelleGlīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.
Der volle Inhalt der QuelleMercuri, Rebecca T. "Computer security." Communications of the ACM 45, no. 10 (October 2002): 11–14. http://dx.doi.org/10.1145/570907.570917.
Der volle Inhalt der QuelleDwan, Berni. "Computer security." Computer Fraud & Security 1999, no. 10 (October 1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.
Der volle Inhalt der QuelleLandwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (August 2001): 3–13. http://dx.doi.org/10.1007/s102070100003.
Der volle Inhalt der QuelleHinde, Stephen. "Computer security." Computers & Security 22, no. 8 (December 2003): 664–69. http://dx.doi.org/10.1016/s0167-4048(03)00003-8.
Der volle Inhalt der QuelleAndrews, M., and J. A. Whittaker. "Computer security." IEEE Security & Privacy Magazine 2, no. 5 (September 2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.
Der volle Inhalt der QuelleHenniker-Heaton, Yvo. "Computer security." Computer Law & Security Review 3, no. 3 (September 1987): 12–13. http://dx.doi.org/10.1016/0267-3649(87)90020-3.
Der volle Inhalt der QuelleMiddleton, R. A. J. "Computer security." Computer Law & Security Review 3, no. 2 (July 1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.
Der volle Inhalt der QuelleBrimicombe, Michael. "Computer security." Electronics Education 1996, no. 2 (1996): 19–23. http://dx.doi.org/10.1049/ee.1996.0041.
Der volle Inhalt der QuelleSaxby, S. "Computer security." Computer Law & Security Review 22, no. 4 (January 2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.
Der volle Inhalt der QuelleGollmann, Dieter. "Computer security." Wiley Interdisciplinary Reviews: Computational Statistics 2, no. 5 (July 15, 2010): 544–54. http://dx.doi.org/10.1002/wics.106.
Der volle Inhalt der QuelleZhang, Guo-Liang. "Analysing Computer System Security and Computer Network Security." Engineering Technology Trends 2, no. 4 (2024): 0. http://dx.doi.org/10.37155/2972-483x-0204-3.
Der volle Inhalt der QuelleSuleymanova, Myalkhazni L., and Olga Yu Yanova. "RESEARCH IN THE FIELD OF COMPUTER SECURITY AND PREVENTION OF COMPUTER VIRUSES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/7, no. 153 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2024.12.07.006.
Der volle Inhalt der QuelleStosic, Lazar, and Dragan Velickovic. "Computer security and security technologies." Journal of Process Management. New Technologies 1, no. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.
Der volle Inhalt der QuelleAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (August 17, 2019): 37–47. https://doi.org/10.5281/zenodo.3370116.
Der volle Inhalt der QuelleMing, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Der volle Inhalt der QuelleZizaeva, Ana, Yakha A. Khadueva, and Olga A. Pyrnova. "APPLICATION OF INFORMATION SECURITY IN COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1/10, no. 154 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2025.01.10.006.
Der volle Inhalt der QuelleAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (November 8, 2019): 37–47. https://doi.org/10.5281/zenodo.3532949.
Der volle Inhalt der QuelleHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Der volle Inhalt der QuelleTrcek, D. "Security Metrics Foundations for Computer Security." Computer Journal 53, no. 7 (November 3, 2009): 1106–12. http://dx.doi.org/10.1093/comjnl/bxp094.
Der volle Inhalt der QuelleMcdowall, R. D. "Computer (in)security?1: logical security." Quality Assurance Journal 4, no. 4 (2000): 197–205. http://dx.doi.org/10.1002/1099-1786(200012)4:4<197::aid-qaj114>3.0.co;2-b.
Der volle Inhalt der QuelleMarkelova, E. B., and G. V. Popkov. "Home Computer Security." Interexpo GEO-Siberia 6 (May 18, 2022): 170–78. http://dx.doi.org/10.33764/2618-981x-2022-6-170-178.
Der volle Inhalt der QuelleCarlson, David. "Teaching computer security." ACM SIGCSE Bulletin 36, no. 2 (June 2004): 64–67. http://dx.doi.org/10.1145/1024338.1024374.
Der volle Inhalt der QuelleNo Author. "Computer security news." ACM SIGSAC Review 6, no. 2 (July 1988): 4–5. http://dx.doi.org/10.1145/62175.62177.
Der volle Inhalt der QuelleW, L. "Commonsense Computer Security." Journal of Information Technology 4, no. 3 (September 1989): 171–72. http://dx.doi.org/10.1057/jit.1989.26.
Der volle Inhalt der QuelleChurchill, Elizabeth, Les Nelson, and Diana K. Smetters. "Useful Computer Security." IEEE Internet Computing 12, no. 3 (May 2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.
Der volle Inhalt der QuelleGengler, Barbara. "Computer security portals." Computer Fraud & Security 1999, no. 2 (February 1999): 6–7. http://dx.doi.org/10.1016/s1361-3723(99)80002-5.
Der volle Inhalt der QuelleWilding, Edward. "Commonsense computer security." Computer Fraud & Security Bulletin 1990, no. 7 (July 1990): 17–18. http://dx.doi.org/10.1016/0142-0496(90)90013-b.
Der volle Inhalt der QuelleWilliams, Paul. "Auditing Computer Security." Computer Fraud & Security Bulletin 1990, no. 5 (May 1990): 19. http://dx.doi.org/10.1016/0142-0496(90)90057-r.
Der volle Inhalt der QuelleTimms, Mike. "Integrated computer security." Computer Fraud & Security Bulletin 1990, no. 6 (June 1990): 9–14. http://dx.doi.org/10.1016/0142-0496(90)90150-j.
Der volle Inhalt der QuelleSmith, M. R. "Commonsense computer security." Computer Fraud & Security Bulletin 1991, no. 3 (March 1991): 7–15. http://dx.doi.org/10.1016/0142-0496(91)90062-a.
Der volle Inhalt der QuelleWood, Charles Cresson. "Commonsense computer security." Computer Fraud & Security Bulletin 1994, no. 9 (September 1994): 17–18. http://dx.doi.org/10.1016/0142-0496(94)90186-4.
Der volle Inhalt der QuelleCollinson, Helen. "Computer security surveys." Computer Fraud & Security Bulletin 1995, no. 4 (April 1995): 8–10. http://dx.doi.org/10.1016/0142-0496(95)80148-0.
Der volle Inhalt der QuelleTomayko, J. "Anecdotes [computer security]." IEEE Annals of the History of Computing 23, no. 2 (April 2001): 78–79. http://dx.doi.org/10.1109/85.929916.
Der volle Inhalt der QuelleCaruso, Ronald D. "Personal Computer Security." RadioGraphics 23, no. 5 (September 2003): 1329–37. http://dx.doi.org/10.1148/rg.235035021.
Der volle Inhalt der QuelleSalton, Gerald. "Computer-security technology." Information Processing & Management 22, no. 3 (January 1986): 269–70. http://dx.doi.org/10.1016/0306-4573(86)90059-2.
Der volle Inhalt der QuelleNarendra, Kumar Chahar. "Computer Network Security." International Journal of Innovative Science and Research Technology 7, no. 3 (April 11, 2022): 1031–34. https://doi.org/10.5281/zenodo.6448170.
Der volle Inhalt der QuelleYemchenko, I. "Security requirements for personal computers." Товарознавчий вісник 17, no. 1 (February 23, 2024): 92–104. http://dx.doi.org/10.62763/ef/1.2024.92.
Der volle Inhalt der QuelleKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Der volle Inhalt der QuelleKuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.
Der volle Inhalt der QuelleAhmadian Ramaki, Ali. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security 2, no. 3 (September 30, 2012): 37–47. http://dx.doi.org/10.5121/ijcis.2012.2303.
Der volle Inhalt der QuelleKwiatkowski, Feliks, and Alistair Kelman. "Computer security: Readings from security management magazine." Computer Fraud & Security Bulletin 9, no. 9 (July 1987): 13–14. http://dx.doi.org/10.1016/0142-0496(87)90104-4.
Der volle Inhalt der QuelleCoronado, Adolfo S. "Principles of Computer Security: CompTIA Security+™." Journal of Information Privacy and Security 9, no. 1 (January 2013): 70–72. http://dx.doi.org/10.1080/15536548.2013.10845674.
Der volle Inhalt der QuelleCERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Der volle Inhalt der Quelle