Books on the topic 'Computer and Information Science – Department of Computer and Information Science'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer and Information Science – Department of Computer and Information Science.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Society, Canadian Information Processing. The protection of privacy in information systems: Operational guidelines. Toronto: The Society, 1988.
Find full textIFIP TC11 International Conference on Information Security (11th 1995 Cape Town, South Africa). Information security-the next decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95. London: Chapman & Hall on behalf of the IFIP, 1995.
Find full textToigo, Jon William. Disaster recovery planning: Strategies for protecting critical information. 2nd ed. Upper Saddle River, N.J: Prentice Hall PTR, 2000.
Find full textRhodes, Keith A. Information security: The proposed Computer Security Enhancement Act of 1999 : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.
Find full textToigo, Jon William. Disaster recovery planning: Managing risk and catastrophe in information systems. Englewood Cliffs, N.J: Yourdon Press, 1989.
Find full textUnited States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Science, Research, and Technology. Computer Security Act of 1987: Hearing before the Subcommittee on Science, Research, and Technology and the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One hundredth Congress, first session, February 26, 1987. Washington: U.S. G.P.O., 1987.
Find full textUnited, States Congress House Committee on Science Space and Technology Subcommittee on Science Research and Technology. Computer Security Act of 1987: Hearing before the Subcommittee on Science, Research, and Technology and the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One hundredth Congress, first session, February 26, 1987. Washington: U.S. G.P.O., 1987.
Find full textUnited States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Science, Research, and Technology. The Computer Security Act of 1987: Hearing before the Subcommittee on Science, Research, and Technology and the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One Hundreth Congress, first session, February 26, 1987. Washington: U.S. G.P.O., 1987.
Find full textBertaccini, Bruno, Luigi Fabbris, and Alessandra Petrucci, eds. ASA 2021 Statistics and Information Systems for Policy Evaluation. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-304-8.
Full textOffice, General Accounting. Information security: Safeguarding of data in excessed Department of Energy computers : report to the Chairman, Committee on Science, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington 20013): U.S. General Accounting Office, 2001.
Find full textUnited States. Defense Science Board. Task Force on Mission Impact of Foreign Influence on DoD Software. Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software. Washington, D.C: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, 2007.
Find full textUnited States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials. GAO survey, federal government computer security: Hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One hundredth Congress, first session, May 19, 1987. Washington: U.S. G.P.O., 1987.
Find full textservice), SpringerLink (Online, ed. Preserving Privacy in Data Outsourcing. Boston, MA: Springer Science+Business Media, LLC, 2011.
Find full textRhodes, Keith A. Information security: The Melissa computer virus demonstrates urgent need for stronger protection over systems and sensitive data : statement of Keith A. Rhodes, Technical Director for Computers and Telecommunications, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.
Find full textLee, Roger. Computer and Information Science. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textLee, Roger, ed. Computer and Information Science. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40171-3.
Full textLee, Roger, ed. Computer and Information Science. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-10509-3.
Full textLee, Roger, ed. Computer and Information Science. Heidelberg: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00804-2.
Full textLee, Roger, ed. Computer and Information Science. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-60170-0.
Full textLee, Roger, ed. Computer and Information Science. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-25213-7.
Full textLee, Roger, ed. Computer and Information Science. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-98693-7.
Full textLee, Roger, and Haeng-Kon Kim, eds. Computer and Information Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-79187-4.
Full textMeghanathan, Natarajan, Nabendu Chaki, and Dhinaharan Nagamalai, eds. Advances in Computer Science and Information Technology. Computer Science and Information Technology. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27317-9.
Full textCybersecurity: A review of public and private efforts to secure our nation's Internet infrastructure : hearing before the Subcommittee on Information Policy, Census, and National Archives of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, October 23, 2007. Washington: U.S. G.P.O., 2008.
Find full textOffice, General Accounting. Information security: Vulnerabilities in DOE's systems for unclassified civilian research : report to the Committee on Science, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): U.S. General Accounting Office, 2000.
Find full textLee, Roger. Computer and Information Science 2012. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textLee, Roger. Computer and Information Science 2011. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textLee, Roger, ed. Computer and Information Science 2015. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-23467-0.
Full textLee, Roger, ed. Computer and Information Science 2012. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30454-5.
Full textLee, Roger, Gongzu Hu, and Huaikou Miao, eds. Computer and Information Science 2009. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01209-9.
Full textLee, Roger, ed. Computer and Information Science 2011. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21378-6.
Full textLee, Roger, ed. Computer and Information Science 2010. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15405-8.
Full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.
Find full textAddressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.
Find full textGroup, United States Defense Modeling and Simulation Office Information/Data Base Technology Working. Defense Modeling and Simulation Office Information/Data Base Technology Working Group (I/DBTWG) meetings held during the week of July 11-15, 1994. Santa Monica, CA: Rand, 1994.
Find full textKim, Tai-hoon, Hojjat Adeli, Rosslin John Robles, and Maricel Balitanas, eds. Advanced Computer Science and Information Technology. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24267-0.
Full textTomar, G. S., Ruay-Shiung Chang, Osvaldo Gervasi, Tai-hoon Kim, and Samir Kumar Bandyopadhyay, eds. Advanced Computer Science and Information Technology. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13346-6.
Full textLee, Roger, ed. Computer and Information Science 2021—Summer. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79474-3.
Full textMeghanathan, Natarajan, Nabendu Chaki, and Dhinaharan Nagamalai, eds. Advances in Computer Science and Information Technology. Computer Science and Engineering. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27308-7.
Full textservice), SpringerLink (Online, ed. Theoretical Computer Science. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2011.
Find full textNaughton, Jeffrey F. Parallel and Distributed Information Systems. Boston, MA: Springer US, 1998.
Find full textMontgomery, A. Y. Introduction to computer science. 2nd ed. Sydney: Prentice Hall, 1986.
Find full textSummary of Research 2001, Department of Computer Science, Graduate School of Operational and Information Sciences. Storming Media, 2002.
Find full textProgress Report 1 January 1986 - 31 December 1986 Department of Computer and Information Science. Roskilde, Denmark: Riso National Laboratory, 1987.
Find full textJan H.P. Eloff (Editor) and Sebastian von Solms (Editor), eds. Information Security - the Next Decade (IFIP International Federation for Information Processing). Springer, 1995.
Find full textM, Robertson Alexander, and British Library. Research and Development Dept., eds. Effectiveness of retrieval in statistically-based and knowledge-based retrieval systems: Report for the period October 1989 to September 1990 to the British Library Research and Development Department on Project SI/G/871. [Sheffield, U.K: Dept. of Information Studies, University of Sheffield, 1990.
Find full textUnited States. General Accounting Office., ed. Information security: Recent attacks on federal web sites underscore need for stronger information security management : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full text