Academic literature on the topic 'Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer security"
Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Full textKubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.
Full textSchmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.
Full textAlkandary, Yaquob H. A., and Eng Fawzyeya M. A. Alhallaq. "Computer Security." IJARCCE 5, no. 1 (2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.
Full textWhite, Richard. "Computer Security." Urologic Clinics of North America 13, no. 1 (1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.
Full textLincoln, Alan Jay. "Computer Security." Library & Archival Security 11, no. 1 (1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.
Full textGlīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.
Full textMercuri, Rebecca T. "Computer security." Communications of the ACM 45, no. 10 (2002): 11–14. http://dx.doi.org/10.1145/570907.570917.
Full textDwan, Berni. "Computer security." Computer Fraud & Security 1999, no. 10 (1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.
Full textLandwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (2001): 3–13. http://dx.doi.org/10.1007/s102070100003.
Full textDissertations / Theses on the topic "Computer security"
Anderson, Ross John. "Robust computer security." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.
Full textPohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.
Full textBurchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Full textBesada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.
Full textMemon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Full textTaramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.
Full textSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Full textLomas, Thomas Mark Angus. "Aspects of computer network security." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241051.
Full textSoewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textLi, QianQian. "Human-Computer Interaction: Security Aspects." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427166.
Full textBooks on the topic "Computer security"
Hollmann, Pauline. Computer security. Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Find full textKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Full textKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Full textFournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Full textLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Full textLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Full textBoureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Full textKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Full textBook chapters on the topic "Computer security"
Parker, Carey. "Computer Security." In Firewalls Don't Stop Dragons. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6189-7_5.
Full textParker, Carey. "Computer Security." In Firewalls Don't Stop Dragons. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3852-3_5.
Full textWilson, Kevin. "Computer Security." In Everyday Computing with Windows 8.1. Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0805-2_24.
Full textSchneier, Bruce. "Computer Security." In Secrets and Lies. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch8.
Full textHelfrich, James. "Computer Security." In Security for Software Engineers. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-2.
Full textDuffany, Jeffrey L. "Computer Security." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_1.
Full textBell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "Computer Security." In Cybersins and Digital Good Deeds. CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-17.
Full textCrutcher, Paul D., Neeraj Kumar Singh, and Peter Tiegs. "Computer Security." In Essential Computer Science. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7107-0_6.
Full textAshley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.
Full textLefebvre, E. "Computer Network Security." In Multisensor Fusion. Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.
Full textConference papers on the topic "Computer security"
Lin, Hongkai. "Computer network information security monitoring system." In Second International Conference on Big Data, Computational Intelligence and Applications (BDCIA 2024), edited by Sos S. Agaian. SPIE, 2025. https://doi.org/10.1117/12.3059895.
Full textHowerton, Paul W. "Computer security." In the 1985 ACM annual conference. ACM Press, 1985. http://dx.doi.org/10.1145/320435.320579.
Full textValentine, David W. "Practical computer security." In the 6th conference. ACM Press, 2005. http://dx.doi.org/10.1145/1095714.1095758.
Full textNanda, Priyadarsi, and Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)." In IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. ACM, 2010. http://dx.doi.org/10.1145/3258155.
Full textTurner, Claude F., Blair Taylor, and Siddharth Kaza. "Security in computer literacy." In the 42nd ACM technical symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1953163.1953174.
Full text"Computer networks and security." In 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004. IEEE, 2004. http://dx.doi.org/10.1109/inmic.2004.1492922.
Full textGuizani, M., and Hsiao-Hwa Chen. "Computer & network security." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1578354.
Full textCampbell, Marlene. "Ethics and computer security." In the 1988 ACM sixteenth annual conference. ACM Press, 1988. http://dx.doi.org/10.1145/322609.322781.
Full text"Computer security acquisition management." In 2nd Aerospace Computer Security Conference. American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2774.
Full textCostello, Joanne. "Security on computer networks." In the 19th annual ACM SIGUCCS conference. ACM Press, 1991. http://dx.doi.org/10.1145/122898.122906.
Full textReports on the topic "Computer security"
Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.
Full textSECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada404996.
Full textTodd, Mary Anne, and Constance Guitian. Computer security training guidelines. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.
Full textBerg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1034885.
Full textFaculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.
Full textSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.
Full textBergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203261.
Full textGuttman, Barbara, and Edward Roback. An introduction to computer security :. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.
Full textRoback, Edward. Glossary of computer security terminology. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4659.
Full textSkandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.
Full text