Books on the topic 'Computer networks Computer security. Computers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer networks Computer security. Computers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Per, Christoffersson, ed. Security mechanisms for computer networks. Ellis Horwood, 1989.
Find full textVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.
Find full textRaouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Taylor & Francis/CRC, 2014.
Find full textThermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.
Find full textAri, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2008.
Find full textComputer forensics: Computer crime scene investigation. 2nd ed. Charles River Media, 2005.
Find full textAbrams, Marshall D. Tutorial computer and network security. IEEE Computer Society Press, 1987.
Find full textBrian, Hatch, ed. Building Linux Virtual Private Networks (VPNs). New Riders, 2002.
Find full textA, Fisch Eric, and Pooch Udo W. 1944-, eds. Computer system and network security. CRC Press, 1996.
Find full textComputer forensics: Computer crime scene investigation. Charles River Media, 2002.
Find full textGreg, Kellogg, ed. Security monitoring with Cisco security MARS. Cisco Press, 2007.
Find full textWilliam, Stallings. Computer security: Principles and practice. Prentice Hall, 2008.
Find full textHiroshi, Yoshiura, ed. Advances in information and computer security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings. Springer, 2006.
Find full textservice), SpringerLink (Online, ed. Guide to Computer Network Security. 2nd ed. Springer London, 2013.
Find full textF, Hempelmann Christian, Raskin Victor, and Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., eds. New Security Paradigms Workshop: Proceedings, September 23-26, 2002, Virginia Beach, VA. Association for Computing Machinery, 2002.
Find full textE, Silverman Richard, and Byrnes Robert G, eds. Linux Security Cookbook. O'Reilly, 2003.
Find full textDebbabi, Mourad. Embedded Java security: Security for mobile devices. Springer, 2010.
Find full textBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Find full textRak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.
Find full textIrwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2016.
Find full textIrwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2016.
Find full textIrwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2017.
Find full textIntroduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2013.
Find full textMerkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.
Find full textII, William (Chuck) Easttom. Computer Security Fundamentals. Pearson Education, Limited, 2019.
Find full textEasttom, William (Chuck) II. Computer Security Fundamentals. Pearson Education, Limited, 2013.
Find full text1961-, Hopkins Ronald D., and Tokere Wesley P, eds. Computer security: Intrusion, detection, and prevention. Nova Science Publishers, 2009.
Find full textDhanjani, Nitesh, and Justin Clarke. Network Security Tools: Writing, Hacking, and Modifying Security Tools. O'Reilly Media, Inc., 2005.
Find full textZeltser, Lenny, Scott Winters, Ronald W. Ritchey, Karen Fredrick, and Stephen Northcutt. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Sams, 2002.
Find full textKrutz, Ronald L., James Conley, and Eric Cole. Network Security Bible. Wiley, 2005.
Find full text