Books on the topic 'Biometry. Computer security. Computers Computer software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Biometry. Computer security. Computers Computer software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.
Find full textSecurity matters: Getting software security right with static analysis. Addison-Wesley, 2007.
Find full textSteve, Lipner, ed. The security development lifecycle: SDL, a process for developing demonstrably more secure software. Microsoft Press, 2006.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Find full textKumar, Ajay. Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers. Springer-Verlag Berlin Heidelberg, 2010.
Find full textA, Garay Juan, ed. Information security: 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings. Springer, 2007.
Find full textParker, Philip M. Information technology (IT) security software in Hong Kong: A strategic reference, 2006. Icon Group International, 2007.
Find full textHiroshi, Yoshiura, ed. Advances in information and computer security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings. Springer, 2006.
Find full textMoskowitz, Jeremy. Group policy: Fundamentals, security, and troubleshooting. Wiley Pub., 2008.
Find full textArtificial intelligence and security in computing systems: 9th international conference, ACS '2002, Mied̦zyzdroje, Poland, October 23-25, 2002 : proceedings. Kluwer Academic Publishers, 2003.
Find full textFlammini, Francesco. Computer Safety, Reliability, and Security: 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textSchoitsch, Erwin. Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings. Springer-Verlag Berlin Heidelberg, 2011.
Find full text1950-, Daniel Peter, ed. SAFECOMP 97: The 16th International Conference on Computer Safety, Reliability, and Security, York, UK, September 7-10, 1997. Springer, 1997.
Find full textChrisment, Isabelle. Managing the Dynamics of Networks and Services: 5th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2011, Nancy, France, June 13-17, 2011. Proceedings. Springer Berlin Heidelberg, 2011.
Find full textCOMPASS '90 (1990 National Institute of Standards and Technology). Systems integrity, software safety and process security: COMPASS '90 : proceedings of the Fifth Annual Conference on Computer Assurance : June 25-June 28, 1990, National Institute of Standards and Technology, Gaithersburg, Maryland. IEEE, 1990.
Find full textCOMPASS '91 (1991 National Institute of Standards and Technology). Systems integrity, software safety, and process security: COMPASS '91 : proceedings of the sixth annual Conference on Computer Assurance, June 24-June 27, 1991, National Institute of Standards and Technology, Gaithersburg, Maryland. IEEE, 1991.
Find full textKansas. Legislature. Legislative Division of Post Audit. Computer security audit report: Surplus computer equipment : determining whether state agencies effectively remove software and agency data from surplus computers. Kansas Legislative Division of Post Audit, 2008.
Find full textSecret software: Making the most of computer resources for data protection, information recovery, forensic examination, crime investigation and more. Paladin Press, 2000.
Find full textKil-Hyun, Nam, and Rhee Gwangsoo, eds. Information security and cryptology - ICISC 2007: 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings. Springer, 2007.
Find full textZou, Xukai. Trust and security in collaborative computing. World Scientific, 2008.
Find full textZou, Xukai. Trust and security in collaborative computing. World Scientific, 2008.
Find full textZou, Xukai. Trust and security in collaborative computing. World Scientific, 2008.
Find full textGoos, Gerhard. Information Security: Third International Workshop, ISW 2000 Wollongong, Australia, December 20-21, 2000 Proceedings. Springer-Verlag Berlin Heidelberg, 2000.
Find full textDodson, Adam. Hacking: Computer Hacking for Beginners, How to Hack, and Understanding Computer Security! Ingram Publishing, 2020.
Find full textDodson, Adam. Hacking: Computer Hacking for Beginners, How to Hack, and Understanding Computer Security! Ingram Publishing, 2020.
Find full textDowd, Mark, Justin Schuh, and John McDonald. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, 2006.
Find full textYen, John, and Robert Popp. AI Technologies for Homeland Security: Papers from 2005 AAAI Spring Symposium. AAAI Press, 2005.
Find full textMesbah, Mounir, and Christophe Lalanne. Biostatistics and Computer-Based Analysis of Health Data Using the R Software. Elsevier Science & Technology Books, 2016.
Find full text(Editor), Pim Tuyls, Boris Skoric (Editor), and Tom Kevenaar (Editor), eds. Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, 2007.
Find full textHeath, Craig. Symbian OS Platform Security: Software Development Using the Symbian OS Security Architecture. Wiley & Sons, Incorporated, John, 2007.
Find full textHoglund, Greg, and Jamie Butler. Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security Series). Addison-Wesley Professional, 2005.
Find full textLevy, Elias. Software Vulnerabilities: Identifying, Avoiding, and Mitigating Exploits. Pearson Education, Limited, 2006.
Find full textBultan, Tevfik, Fang Yu, Muath Alkhalaf, and Abdulbaki Aydin. String Analysis for Software Verification and Security. Springer, 2019.
Find full textBultan, Tevfik, Fang Yu, Muath Alkhalaf, and Abdulbaki Aydin. String Analysis for Software Verification and Security. Springer, 2018.
Find full textKriha, Walter, and Roland Schmitz. Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung für sicherheitskritische Bereiche (Xpert.press). Springer, 2008.
Find full textWest, Jacob, and Brian Chess. Secure Programming with Static Analysis (Addison-Wesley Software Security Series). Addison-Wesley Professional, 2007.
Find full text