Academic literature on the topic 'Computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer security"

1

Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.

Full text
Abstract:
The author in this work provides insight into computer systems security. Themes which are discussed is hardware security, logical security, viruses and computer protection. Nowadays computers are a part of daily life, so each user how to know how to protect computer and its data.
APA, Harvard, Vancouver, ISO, and other styles
3

Schmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.

Full text
Abstract:
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home. This article is a brief overview of some of the precautions that should be taken on a daily basis to protect your computer systems, files, data, and other pertinent information.
APA, Harvard, Vancouver, ISO, and other styles
4

Alkandary, Yaquob H. A., and Eng Fawzyeya M. A. Alhallaq. "Computer Security." IJARCCE 5, no. 1 (2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

White, Richard. "Computer Security." Urologic Clinics of North America 13, no. 1 (1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lincoln, Alan Jay. "Computer Security." Library & Archival Security 11, no. 1 (1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Glīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.

Full text
Abstract:
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
APA, Harvard, Vancouver, ISO, and other styles
8

Mercuri, Rebecca T. "Computer security." Communications of the ACM 45, no. 10 (2002): 11–14. http://dx.doi.org/10.1145/570907.570917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dwan, Berni. "Computer security." Computer Fraud & Security 1999, no. 10 (1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Landwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (2001): 3–13. http://dx.doi.org/10.1007/s102070100003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer security"

1

Anderson, Ross John. "Robust computer security." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Full text
Abstract:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of
APA, Harvard, Vancouver, ISO, and other styles
4

Besada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.

Full text
Abstract:
This work consists on the design and implementation of a complete monitored security system. Two computers make up the basic system: one computer is the transmitter and the other is the receiver. Both computers interconnect by modems. Depending on the status of the input sensors (magnetic contacts, motion detectors and others) the transmitter detects an alarm condition and sends a detailed report of the event via modem to the receiver computer.
APA, Harvard, Vancouver, ISO, and other styles
5

Memon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.

Full text
Abstract:
<p>WLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.</p><p>This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.</p><p>We worked in
APA, Harvard, Vancouver, ISO, and other styles
6

Taramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.

Full text
Abstract:
The rapid growth of information and communication systems in recent years has brought with it an increased need for security. Meanwhile, encryption, which constitutes the basis of the majority of security schemes, may imply a significant amount of energy consumption. Encryption algorithms, depending on their complexity, may consume a significant amount of computing resources, such as memory, battery power and processing time. Therefore, low energy encryption is crucial, especially for battery powered and passively powered devices. Thus, it is of great importance to achieve the desired security
APA, Harvard, Vancouver, ISO, and other styles
7

Skaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lomas, Thomas Mark Angus. "Aspects of computer network security." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Soewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph. D.)--Southern Illinois University Carbondale, 2009.<br>"Department of Electrical and Computer Engineering." Keywords: Adaptive security, Computer networks, Intrusion detection. Includes bibliographical references (p. 78-84). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, QianQian. "Human-Computer Interaction: Security Aspects." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427166.

Full text
Abstract:
Along with the rapid development of intelligent information age, users are having a growing interaction with smart devices. Such smart devices are interconnected together in the Internet of Things (IoT). The sensors of IoT devices collect information about users' behaviors from the interaction between users and devices. Since users interact with IoT smart devices for the daily communication and social network activities, such interaction generates a huge amount of network traffic. Hence, users' behaviors are playing an important role in the security of IoT smart devices, and the security a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer security"

1

Pamela, Kane, ed. Compute!'s computer security. Compute! Books, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

W, Roberts D. Computer security. Blenheim Online Publications, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hollmann, Pauline. Computer security. Science Reference Section, Science and Technology Division, Library of Congress, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Katsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Katsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, et al., eds. Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Katsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, et al., eds. Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer security"

1

Parker, Carey. "Computer Security." In Firewalls Don't Stop Dragons. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6189-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parker, Carey. "Computer Security." In Firewalls Don't Stop Dragons. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3852-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wilson, Kevin. "Computer Security." In Everyday Computing with Windows 8.1. Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0805-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schneier, Bruce. "Computer Security." In Secrets and Lies. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Helfrich, James. "Computer Security." In Security for Software Engineers. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duffany, Jeffrey L. "Computer Security." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "Computer Security." In Cybersins and Digital Good Deeds. CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Crutcher, Paul D., Neeraj Kumar Singh, and Peter Tiegs. "Computer Security." In Essential Computer Science. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7107-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ashley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lefebvre, E. "Computer Network Security." In Multisensor Fusion. Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer security"

1

Lin, Hongkai. "Computer network information security monitoring system." In Second International Conference on Big Data, Computational Intelligence and Applications (BDCIA 2024), edited by Sos S. Agaian. SPIE, 2025. https://doi.org/10.1117/12.3059895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Howerton, Paul W. "Computer security." In the 1985 ACM annual conference. ACM Press, 1985. http://dx.doi.org/10.1145/320435.320579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Valentine, David W. "Practical computer security." In the 6th conference. ACM Press, 2005. http://dx.doi.org/10.1145/1095714.1095758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nanda, Priyadarsi, and Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)." In IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. ACM, 2010. http://dx.doi.org/10.1145/3258155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Turner, Claude F., Blair Taylor, and Siddharth Kaza. "Security in computer literacy." In the 42nd ACM technical symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1953163.1953174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Computer networks and security." In 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004. IEEE, 2004. http://dx.doi.org/10.1109/inmic.2004.1492922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guizani, M., and Hsiao-Hwa Chen. "Computer & network security." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1578354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Campbell, Marlene. "Ethics and computer security." In the 1988 ACM sixteenth annual conference. ACM Press, 1988. http://dx.doi.org/10.1145/322609.322781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Computer security acquisition management." In 2nd Aerospace Computer Security Conference. American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Costello, Joanne. "Security on computer networks." In the 19th annual ACM SIGUCCS conference. ACM Press, 1991. http://dx.doi.org/10.1145/122898.122906.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer security"

1

Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

SECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada404996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Todd, Mary Anne, and Constance Guitian. Computer security training guidelines. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Berg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1034885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guttman, Barbara, and Edward Roback. An introduction to computer security :. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roback, Edward. Glossary of computer security terminology. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Skandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!