To see the other types of publications on this topic, follow the link: Computer networks Computers Computer security.

Books on the topic 'Computer networks Computers Computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer networks Computers Computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Computer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Justin, Clarke, ed. Network security tools. Sebastopol, Calif: O'Reilly Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Computer security fundamentals. Upper Saddle River, N.J: Pearson Prentice Hall, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Practical computer network security. Boston: Artech House, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Per, Christoffersson, ed. Security mechanisms for computer networks. Chichester, West Sussex, England: Ellis Horwood, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Sudbury, Mass: Jones and Bartlett Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Boca Raton, [Florida]: Taylor & Francis/CRC, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

R, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brenton, Chris. Mastering network security. 2nd ed. San Francisco, Calif: SYBEX, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mastering network security. San Francisco, Calif: Network, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Thermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Boston, MA: Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ari, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Upper Saddle River, NJ: Addison-Wesley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

McNab, Chris. Network security assessment. 2nd ed. Beijing: O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

McNab, Chris. Network security assessment. 2nd ed. Beijing: O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Network security assessment. 2nd ed. Beijing: O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Network Security Assessment. Sebastopol, CA: O'Reilly Media, Inc., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

McNab, Chris. Network security assessment. 2nd ed. Beijing: O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Brenton, Chris. MasteringNetwork Security. New York: John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Computer forensics: Computer crime scene investigation. 2nd ed. Hingham, Mass: Charles River Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Abrams, Marshall D. Tutorial computer and network security. Washington, D.C: IEEE Computer Society Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Brian, Hatch, ed. Building Linux Virtual Private Networks (VPNs). Indianapolis, Ind: New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

A, Fisch Eric, and Pooch Udo W. 1944-, eds. Computer system and network security. Boca Raton: CRC Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Computer forensics: Computer crime scene investigation. Hingham, Mass: Charles River Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Greg, Kellogg, ed. Security monitoring with Cisco security MARS. Indianapolis, Ind: Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Edward, Witzke, ed. Implementing security for ATM networks. Boston: Artech House, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

William, Stallings. Computer security: Principles and practice. Upper Saddle River, N.J: Prentice Hall, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Corporate computer and network security. 2nd ed. Boston: Prentice Hall, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hiroshi, Yoshiura, ed. Advances in information and computer security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings. Berlin: Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

service), SpringerLink (Online, ed. Guide to Computer Network Security. 2nd ed. London: Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

F, Hempelmann Christian, Raskin Victor, and Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., eds. New Security Paradigms Workshop: Proceedings, September 23-26, 2002, Virginia Beach, VA. New York, N.Y: Association for Computing Machinery, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

E, Silverman Richard, and Byrnes Robert G, eds. Linux Security Cookbook. Beijing: O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Debbabi, Mourad. Embedded Java security: Security for mobile devices. London: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Brown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Rak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kizza, Joseph Migga. Computer Network Security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Computer Network Security. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Irwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Irwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Irwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Merkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

II, William (Chuck) Easttom. Computer Security Fundamentals. Pearson Education, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wilma, Caldwell, ed. Computer security sourcebook. Detroit, MI: Omnigraphics, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Easttom, William (Chuck) II. Computer Security Fundamentals. Pearson Education, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

1961-, Hopkins Ronald D., and Tokere Wesley P, eds. Computer security: Intrusion, detection, and prevention. Hauppauge, NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Dhanjani, Nitesh, and Justin Clarke. Network Security Tools: Writing, Hacking, and Modifying Security Tools. O'Reilly Media, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zeltser, Lenny, Scott Winters, Ronald W. Ritchey, Karen Fredrick, and Stephen Northcutt. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Sams, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Corporate Computer Security. Pearson Education, Limited, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Corporate Computer Security. Pearson, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Krutz, Ronald L., James Conley, and Eric Cole. Network Security Bible. Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography