Academic literature on the topic 'Computer networks Computer security. Computers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Computer security. Computers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks Computer security. Computers"

1

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such
APA, Harvard, Vancouver, ISO, and other styles
2

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by secu
APA, Harvard, Vancouver, ISO, and other styles
4

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this c
APA, Harvard, Vancouver, ISO, and other styles
5

Moore, G. "Security for Computer Networks." Electronics and Power 31, no. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wood, Charles Cresson. "Security for computer networks." Computers & Security 4, no. 3 (1985): 248–49. http://dx.doi.org/10.1016/0167-4048(85)90039-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

CERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Full text
Abstract:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Akhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.

Full text
Abstract:
Along with the current development of Information Technology is always changing to make the security of an information is very important, especially on a network connected to the internet. But what is unfortunate is that the imbalance between each development of a technology is not accompanied by developments in the security system itself, so that there are quite a lot of systems that are still weak and have to be increased by the security wall. This study aims to design a Web-based App interface to facilitate users or administrators in securing network computers from various types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network." Applied Mechanics and Materials 484-485 (January 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.

Full text
Abstract:
With the development of the science and technology of the computer application, the maintenance management and the security of the computers is an important problem. In this paper the author presents his own opinions on these issues. Therefore, the maintenance management of the computer local area network is very important to guarantee the security and stability of the network and to the use of the cyber sources to a maximum.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks Computer security. Computers"

1

Lurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Katsikas, Stamatios. "Game theoretic models of networks security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102611/.

Full text
Abstract:
Decision making in the context of crime execution and crime prevention can be successfully investigated with the implementation of game-theoretic tools. Evolutionary and mean-field game theory allow for the consideration of a large number of interacting players organized in social and behavioural structures, which typically characterize this context. Alternatively, `traditional' game-theoretic approaches can be applied for studying the security of an arbitrary network on a two player non-cooperative game. Theoretically underpinned by these instruments, in this thesis we formulate and analyse g
APA, Harvard, Vancouver, ISO, and other styles
3

Holtje, Carl. "Security in serverless network environments /." Link to online version, 2004. https://ritdml.rit.edu/dspace/handle/1850/439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 121. Thesis directors: Ravi S. Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 113-120). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Nwanze, Nnamdi Chike. "Anomaly-based intrusion detection using using lightweight stateless payload inspection." Diss., Online access via UMI:, 2009.

Find full text
Abstract:
Thesis (Ph. D.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Electrical and Computer Engineering, 2009.<br>Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
6

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Full text
Abstract:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of
APA, Harvard, Vancouver, ISO, and other styles
7

Soewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph. D.)--Southern Illinois University Carbondale, 2009.<br>"Department of Electrical and Computer Engineering." Keywords: Adaptive security, Computer networks, Intrusion detection. Includes bibliographical references (p. 78-84). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Umeh, Njideka Adaku. "Security architecture methodology for large net-centric systems." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/Umeh_09007dcc8049b3f0.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.<br>Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 6, 2007) Includes bibliographical references (p. 60-63).
APA, Harvard, Vancouver, ISO, and other styles
9

Skaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Årnes, Andre. "Risk, Privacy, and Security in Computer Networks." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1725.

Full text
Abstract:
<p>With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network monitoring, incident management, and digital forensics is of increasing importance with the escalation of cybercrime and other network supported serious crimes. New laws and regulations governing electronic communications, cybercrime, and data retention are being proposed, continuously requiring new methods and tools.</p><p>This thesis introduces a novel approach to real-time network risk assessment based on hidden Markov models to represent the likelihood of transitions between security states
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer networks Computer security. Computers"

1

Computer security fundamentals. 2nd ed. Pearson IT Certification, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Justin, Clarke, ed. Network security tools. O'Reilly Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Computer security fundamentals. Pearson Prentice Hall, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Practical computer network security. Artech House, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Per, Christoffersson, ed. Security mechanisms for computer networks. Ellis Horwood, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Taylor & Francis/CRC, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

R, Panko Raymond, ed. Corporate computer security. 3rd ed. Prentice Hall, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brenton, Chris. Mastering network security. 2nd ed. SYBEX, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mastering network security. Network, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer networks Computer security. Computers"

1

Ashley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Verschuren, Jan. "Security of Computer Networks." In State of the Art in Applied Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49248-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Whiteley, David. "Networks and Computer Security." In An Introduction to Information Systems. Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-08467-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Introduction of Computer Networks." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cobb, Chey, Stephen Cobb, M. E. Kabay, and Tim Crothers. "Penetrating Computer Systems and Networks." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bilski, Tomasz. "IP Storage Security Analysis." In Computer Networks. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31217-5_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kwiecień, Andrzej, Michał Maćkowski, and Marcin Sidzina. "Data Security in Microprocessor Units." In Computer Networks. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38865-1_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ksiezopolski, Bogdan, Zbigniew Kotulski, and Pawel Szalachowski. "Adaptive Approach to Network Security." In Computer Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stera, Piotr. "Company’s Data Security – Case Study." In Computer Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Security Threats to Computer Networks." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks Computer security. Computers"

1

Costello, Joanne. "Security on computer networks." In the 19th annual ACM SIGUCCS conference. ACM Press, 1991. http://dx.doi.org/10.1145/122898.122906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Computer networks and security." In 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004. IEEE, 2004. http://dx.doi.org/10.1109/inmic.2004.1492922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rubin-Delanchy, Patrick, Niall M. Adams, and Nicholas A. Heard. "Disassortativity of computer networks." In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). IEEE, 2016. http://dx.doi.org/10.1109/isi.2016.7745482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Session II: Networks & computer security." In 2017 International Conference on Information and Communication Technologies (ICICT). IEEE, 2017. http://dx.doi.org/10.1109/icict.2017.8320161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Session CNS: Computer Networks & Security." In 2019 14th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2019. http://dx.doi.org/10.1109/icces48960.2019.9068139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Session CN: Computer networks & security." In Systems (ICCES). IEEE, 2011. http://dx.doi.org/10.1109/icces.2011.6141008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Session CN: Computer networks & security." In 2012 Seventh International Conference on Computer Engineering & Systems (ICCES). IEEE, 2012. http://dx.doi.org/10.1109/icces.2012.6408473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Haixin Duan and Jianping Wu. "Security management for large computer networks." In Proceedings of APCC/OECC'99 - 5th Asia Pacific Conference on Communications/4th Optoelectronics and Communications Conference. IEEE, 1999. http://dx.doi.org/10.1109/apcc.1999.820481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cao, Chenghai. "The current situation and reform ideas of computer network security education in higher vocational computers." In 2021 5th International Seminar on Education, Management and Social Sciences (ISEMSS 2021). Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210806.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer networks Computer security. Computers"

1

Johannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis, and Marsha Robinson. Computer Network Security and Directory Services Architecture. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada392366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Franklin, Derek L. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada404740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!