Journal articles on the topic 'Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Full textKubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.
Full textSchmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.
Full textAlkandary, Yaquob H. A., and Eng Fawzyeya M. A. Alhallaq. "Computer Security." IJARCCE 5, no. 1 (2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.
Full textWhite, Richard. "Computer Security." Urologic Clinics of North America 13, no. 1 (1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.
Full textLincoln, Alan Jay. "Computer Security." Library & Archival Security 11, no. 1 (1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.
Full textGlīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.
Full textMercuri, Rebecca T. "Computer security." Communications of the ACM 45, no. 10 (2002): 11–14. http://dx.doi.org/10.1145/570907.570917.
Full textDwan, Berni. "Computer security." Computer Fraud & Security 1999, no. 10 (1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.
Full textLandwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (2001): 3–13. http://dx.doi.org/10.1007/s102070100003.
Full textHinde, Stephen. "Computer security." Computers & Security 22, no. 8 (2003): 664–69. http://dx.doi.org/10.1016/s0167-4048(03)00003-8.
Full textAndrews, M., and J. A. Whittaker. "Computer security." IEEE Security & Privacy Magazine 2, no. 5 (2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.
Full textHenniker-Heaton, Yvo. "Computer security." Computer Law & Security Review 3, no. 3 (1987): 12–13. http://dx.doi.org/10.1016/0267-3649(87)90020-3.
Full textMiddleton, R. A. J. "Computer security." Computer Law & Security Review 3, no. 2 (1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.
Full textBrimicombe, Michael. "Computer security." Electronics Education 1996, no. 2 (1996): 19–23. http://dx.doi.org/10.1049/ee.1996.0041.
Full textSaxby, S. "Computer security." Computer Law & Security Review 22, no. 4 (2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.
Full textGollmann, Dieter. "Computer security." Wiley Interdisciplinary Reviews: Computational Statistics 2, no. 5 (2010): 544–54. http://dx.doi.org/10.1002/wics.106.
Full textZhang, Guo-Liang. "Analysing Computer System Security and Computer Network Security." Engineering Technology Trends 2, no. 4 (2024): 0. http://dx.doi.org/10.37155/2972-483x-0204-3.
Full textSuleymanova, Myalkhazni L., and Olga Yu Yanova. "RESEARCH IN THE FIELD OF COMPUTER SECURITY AND PREVENTION OF COMPUTER VIRUSES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/7, no. 153 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2024.12.07.006.
Full textStosic, Lazar, and Dragan Velickovic. "Computer security and security technologies." Journal of Process Management. New Technologies 1, no. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.
Full textAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.
Full textMing, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Full textZizaeva, Ana, Yakha A. Khadueva, and Olga A. Pyrnova. "APPLICATION OF INFORMATION SECURITY IN COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1/10, no. 154 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2025.01.10.006.
Full textAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3532949.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textTrcek, D. "Security Metrics Foundations for Computer Security." Computer Journal 53, no. 7 (2009): 1106–12. http://dx.doi.org/10.1093/comjnl/bxp094.
Full textMcdowall, R. D. "Computer (in)security?1: logical security." Quality Assurance Journal 4, no. 4 (2000): 197–205. http://dx.doi.org/10.1002/1099-1786(200012)4:4<197::aid-qaj114>3.0.co;2-b.
Full textMarkelova, E. B., and G. V. Popkov. "Home Computer Security." Interexpo GEO-Siberia 6 (May 18, 2022): 170–78. http://dx.doi.org/10.33764/2618-981x-2022-6-170-178.
Full textCarlson, David. "Teaching computer security." ACM SIGCSE Bulletin 36, no. 2 (2004): 64–67. http://dx.doi.org/10.1145/1024338.1024374.
Full textNo Author. "Computer security news." ACM SIGSAC Review 6, no. 2 (1988): 4–5. http://dx.doi.org/10.1145/62175.62177.
Full textW, L. "Commonsense Computer Security." Journal of Information Technology 4, no. 3 (1989): 171–72. http://dx.doi.org/10.1057/jit.1989.26.
Full textChurchill, Elizabeth, Les Nelson, and Diana K. Smetters. "Useful Computer Security." IEEE Internet Computing 12, no. 3 (2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.
Full textGengler, Barbara. "Computer security portals." Computer Fraud & Security 1999, no. 2 (1999): 6–7. http://dx.doi.org/10.1016/s1361-3723(99)80002-5.
Full textWilding, Edward. "Commonsense computer security." Computer Fraud & Security Bulletin 1990, no. 7 (1990): 17–18. http://dx.doi.org/10.1016/0142-0496(90)90013-b.
Full textWilliams, Paul. "Auditing Computer Security." Computer Fraud & Security Bulletin 1990, no. 5 (1990): 19. http://dx.doi.org/10.1016/0142-0496(90)90057-r.
Full textTimms, Mike. "Integrated computer security." Computer Fraud & Security Bulletin 1990, no. 6 (1990): 9–14. http://dx.doi.org/10.1016/0142-0496(90)90150-j.
Full textSmith, M. R. "Commonsense computer security." Computer Fraud & Security Bulletin 1991, no. 3 (1991): 7–15. http://dx.doi.org/10.1016/0142-0496(91)90062-a.
Full textWood, Charles Cresson. "Commonsense computer security." Computer Fraud & Security Bulletin 1994, no. 9 (1994): 17–18. http://dx.doi.org/10.1016/0142-0496(94)90186-4.
Full textCollinson, Helen. "Computer security surveys." Computer Fraud & Security Bulletin 1995, no. 4 (1995): 8–10. http://dx.doi.org/10.1016/0142-0496(95)80148-0.
Full textTomayko, J. "Anecdotes [computer security]." IEEE Annals of the History of Computing 23, no. 2 (2001): 78–79. http://dx.doi.org/10.1109/85.929916.
Full textCaruso, Ronald D. "Personal Computer Security." RadioGraphics 23, no. 5 (2003): 1329–37. http://dx.doi.org/10.1148/rg.235035021.
Full textSalton, Gerald. "Computer-security technology." Information Processing & Management 22, no. 3 (1986): 269–70. http://dx.doi.org/10.1016/0306-4573(86)90059-2.
Full textNarendra, Kumar Chahar. "Computer Network Security." International Journal of Innovative Science and Research Technology 7, no. 3 (2022): 1031–34. https://doi.org/10.5281/zenodo.6448170.
Full textYemchenko, I. "Security requirements for personal computers." Товарознавчий вісник 17, no. 1 (2024): 92–104. http://dx.doi.org/10.62763/ef/1.2024.92.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textKuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.
Full textAhmadian Ramaki, Ali. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security 2, no. 3 (2012): 37–47. http://dx.doi.org/10.5121/ijcis.2012.2303.
Full textKwiatkowski, Feliks, and Alistair Kelman. "Computer security: Readings from security management magazine." Computer Fraud & Security Bulletin 9, no. 9 (1987): 13–14. http://dx.doi.org/10.1016/0142-0496(87)90104-4.
Full textCoronado, Adolfo S. "Principles of Computer Security: CompTIA Security+™." Journal of Information Privacy and Security 9, no. 1 (2013): 70–72. http://dx.doi.org/10.1080/15536548.2013.10845674.
Full textCERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Full text