Academic literature on the topic 'Computer networks Computer security. Computers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Computer security. Computers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks Computer security. Computers"
Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textMoore, G. "Security for Computer Networks." Electronics and Power 31, no. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.
Full textWood, Charles Cresson. "Security for computer networks." Computers & Security 4, no. 3 (1985): 248–49. http://dx.doi.org/10.1016/0167-4048(85)90039-2.
Full textCERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Full textAkhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textWang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network." Applied Mechanics and Materials 484-485 (January 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.
Full textDissertations / Theses on the topic "Computer networks Computer security. Computers"
Lurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.
Full textKatsikas, Stamatios. "Game theoretic models of networks security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102611/.
Full textHoltje, Carl. "Security in serverless network environments /." Link to online version, 2004. https://ritdml.rit.edu/dspace/handle/1850/439.
Full textZhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.
Full textNwanze, Nnamdi Chike. "Anomaly-based intrusion detection using using lightweight stateless payload inspection." Diss., Online access via UMI:, 2009.
Find full textBurchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Full textSoewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textUmeh, Njideka Adaku. "Security architecture methodology for large net-centric systems." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/Umeh_09007dcc8049b3f0.pdf.
Full textSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Full textÅrnes, Andre. "Risk, Privacy, and Security in Computer Networks." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1725.
Full textBooks on the topic "Computer networks Computer security. Computers"
Per, Christoffersson, ed. Security mechanisms for computer networks. Ellis Horwood, 1989.
Find full textVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.
Find full textRaouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Taylor & Francis/CRC, 2014.
Find full textBook chapters on the topic "Computer networks Computer security. Computers"
Ashley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.
Full textVerschuren, Jan. "Security of Computer Networks." In State of the Art in Applied Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49248-8_7.
Full textWhiteley, David. "Networks and Computer Security." In An Introduction to Information Systems. Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-08467-5_9.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Introduction of Computer Networks." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-2.
Full textCobb, Chey, Stephen Cobb, M. E. Kabay, and Tim Crothers. "Penetrating Computer Systems and Networks." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch15.
Full textBilski, Tomasz. "IP Storage Security Analysis." In Computer Networks. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31217-5_24.
Full textKwiecień, Andrzej, Michał Maćkowski, and Marcin Sidzina. "Data Security in Microprocessor Units." In Computer Networks. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38865-1_50.
Full textKsiezopolski, Bogdan, Zbigniew Kotulski, and Pawel Szalachowski. "Adaptive Approach to Network Security." In Computer Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3_28.
Full textStera, Piotr. "Company’s Data Security – Case Study." In Computer Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_30.
Full textKizza, Joseph Migga. "Security Threats to Computer Networks." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_3.
Full textConference papers on the topic "Computer networks Computer security. Computers"
Costello, Joanne. "Security on computer networks." In the 19th annual ACM SIGUCCS conference. ACM Press, 1991. http://dx.doi.org/10.1145/122898.122906.
Full text"Computer networks and security." In 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004. IEEE, 2004. http://dx.doi.org/10.1109/inmic.2004.1492922.
Full textDas, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.
Full textRubin-Delanchy, Patrick, Niall M. Adams, and Nicholas A. Heard. "Disassortativity of computer networks." In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). IEEE, 2016. http://dx.doi.org/10.1109/isi.2016.7745482.
Full text"Session II: Networks & computer security." In 2017 International Conference on Information and Communication Technologies (ICICT). IEEE, 2017. http://dx.doi.org/10.1109/icict.2017.8320161.
Full text"Session CNS: Computer Networks & Security." In 2019 14th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2019. http://dx.doi.org/10.1109/icces48960.2019.9068139.
Full text"Session CN: Computer networks & security." In Systems (ICCES). IEEE, 2011. http://dx.doi.org/10.1109/icces.2011.6141008.
Full text"Session CN: Computer networks & security." In 2012 Seventh International Conference on Computer Engineering & Systems (ICCES). IEEE, 2012. http://dx.doi.org/10.1109/icces.2012.6408473.
Full textHaixin Duan and Jianping Wu. "Security management for large computer networks." In Proceedings of APCC/OECC'99 - 5th Asia Pacific Conference on Communications/4th Optoelectronics and Communications Conference. IEEE, 1999. http://dx.doi.org/10.1109/apcc.1999.820481.
Full textCao, Chenghai. "The current situation and reform ideas of computer network security education in higher vocational computers." In 2021 5th International Seminar on Education, Management and Social Sciences (ISEMSS 2021). Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210806.100.
Full textReports on the topic "Computer networks Computer security. Computers"
Johannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis, and Marsha Robinson. Computer Network Security and Directory Services Architecture. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada392366.
Full textFranklin, Derek L. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada404740.
Full text