Books on the topic 'Biometry. Computer security. Computers Computer software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Biometry. Computer security. Computers Computer software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Core software security: Security at the source. Taylor & Francis, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Security matters: Getting software security right with static analysis. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Computer forensics: Computer crime scene investigation. Charles River Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Steve, Lipner, ed. The security development lifecycle: SDL, a process for developing demonstrably more secure software. Microsoft Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Ajay. Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers. Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A, Garay Juan, ed. Information security: 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Parker, Philip M. Information technology (IT) security software in Hong Kong: A strategic reference, 2006. Icon Group International, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Stevenson, Larry. Rootkits for dummies. Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Security for service oriented architectures. CRC Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hiroshi, Yoshiura, ed. Advances in information and computer security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings. Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Madden, Wayne. Implementing AS/400 security. 2nd ed. Duke Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Carol, Woodbury, ed. Implementing AS/400 security. 3rd ed. Duke Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Madden, Wayne. Implementing AS/400 security. Duke Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Group policy: Management, troubleshooting, and security. Wiley Pub., Inc., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Moskowitz, Jeremy. Group policy: Fundamentals, security, and troubleshooting. Wiley Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Artificial intelligence and security in computing systems: 9th international conference, ACS '2002, Mied̦zyzdroje, Poland, October 23-25, 2002 : proceedings. Kluwer Academic Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Flammini, Francesco. Computer Safety, Reliability, and Security: 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Schoitsch, Erwin. Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings. Springer-Verlag Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

1950-, Daniel Peter, ed. SAFECOMP 97: The 16th International Conference on Computer Safety, Reliability, and Security, York, UK, September 7-10, 1997. Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hei ke jun tuan. Jun shi ke xue chu ban she, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Chrisment, Isabelle. Managing the Dynamics of Networks and Services: 5th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2011, Nancy, France, June 13-17, 2011. Proceedings. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

COMPASS '90 (1990 National Institute of Standards and Technology). Systems integrity, software safety and process security: COMPASS '90 : proceedings of the Fifth Annual Conference on Computer Assurance : June 25-June 28, 1990, National Institute of Standards and Technology, Gaithersburg, Maryland. IEEE, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

COMPASS '91 (1991 National Institute of Standards and Technology). Systems integrity, software safety, and process security: COMPASS '91 : proceedings of the sixth annual Conference on Computer Assurance, June 24-June 27, 1991, National Institute of Standards and Technology, Gaithersburg, Maryland. IEEE, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Edge, Charles S. Foundations of MAC OS X Leopard security. Apress, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kansas. Legislature. Legislative Division of Post Audit. Computer security audit report: Surplus computer equipment : determining whether state agencies effectively remove software and agency data from surplus computers. Kansas Legislative Division of Post Audit, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Secret software: Making the most of computer resources for data protection, information recovery, forensic examination, crime investigation and more. Paladin Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kil-Hyun, Nam, and Rhee Gwangsoo, eds. Information security and cryptology - ICISC 2007: 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Turnbull, James. Hardening Linux. Apress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zou, Xukai. Trust and security in collaborative computing. World Scientific, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Zou, Xukai. Trust and security in collaborative computing. World Scientific, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Zou, Xukai. Trust and security in collaborative computing. World Scientific, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Goos, Gerhard. Information Security: Third International Workshop, ISW 2000 Wollongong, Australia, December 20-21, 2000 Proceedings. Springer-Verlag Berlin Heidelberg, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Dodson, Adam. Hacking: Computer Hacking for Beginners, How to Hack, and Understanding Computer Security! Ingram Publishing, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Dodson, Adam. Hacking: Computer Hacking for Beginners, How to Hack, and Understanding Computer Security! Ingram Publishing, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Dowd, Mark, Justin Schuh, and John McDonald. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Schoitsch, Erwin. Computer Safety, Reliability, and Security. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Yen, John, and Robert Popp. AI Technologies for Homeland Security: Papers from 2005 AAAI Spring Symposium. AAAI Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mesbah, Mounir, and Christophe Lalanne. Biostatistics and Computer-Based Analysis of Health Data Using the R Software. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

(Editor), Pim Tuyls, Boris Skoric (Editor), and Tom Kevenaar (Editor), eds. Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Heath, Craig. Symbian OS Platform Security: Software Development Using the Symbian OS Security Architecture. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hoglund, Greg, and Jamie Butler. Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security Series). Addison-Wesley Professional, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Levy, Elias. Software Vulnerabilities: Identifying, Avoiding, and Mitigating Exploits. Pearson Education, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bultan, Tevfik, Fang Yu, Muath Alkhalaf, and Abdulbaki Aydin. String Analysis for Software Verification and Security. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bultan, Tevfik, Fang Yu, Muath Alkhalaf, and Abdulbaki Aydin. String Analysis for Software Verification and Security. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kriha, Walter, and Roland Schmitz. Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung für sicherheitskritische Bereiche (Xpert.press). Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

West, Jacob, and Brian Chess. Secure Programming with Static Analysis (Addison-Wesley Software Security Series). Addison-Wesley Professional, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!