Books on the topic 'Computer viruses. Cyberterrorism. Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer viruses. Cyberterrorism. Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jacobson, George V. Cybersecurity, botnets, and cyberterrorism. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Day-MacLeod, Deirdre. Viruses and spam. New York: Rosen Central, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bowden, Mark. Worm: The first digital world war. New York: Grove Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Parikka, Jussi. Digital contagions: A media archaeology of computer viruses. New York: Peter Lang, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Are we prepared for cyberwar? : hearing before ... 106th Congress, 2nd session, March 9, 2000. Washingotn, DC: U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. Washington, DC: U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Widodo. Sistem pemidanaan dalam cyber crime. Sleman, Yogyakarta: Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Widodo. Sistem pemidanaan dalam cyber crime. Sleman, Yogyakarta: Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kong jian xin xi dui kang. Beijing Shi: Guo fang gong ye chu ban she, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Indonesia. Badan Pembinaan Hukum Nasional., ed. Pengkajian hukum tentang penyalahgunaan teknologi siber dalam gerakan teroris. Jakarta: Badan Pembinaan Hukum Nasional, Departemen Hukum dan Hak Asasi Manusia RI, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Indonesia. Badan Pembinaan Hukum Nasional, ed. EU Convention on Cybercrime dikaitkan dengan upaya regulasi tindak pidana teknologi informasi. Jakarta: Badan Pembinaan Hukum Nasional, Kementerian Hukum dan Hak Asasi Manusia RI, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Widodo. Sistem pemidanaan dalam cyber crime. Sleman, Yogyakarta: Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Widodo. Sistem pemidanaan dalam cyber crime. Sleman, Yogyakarta: Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kong jian xin xi dui kang. Beijing Shi: Guo fang gong ye chu ban she, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Denning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Denning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Brock, Jack L. November 1988 Internet computer virus and the vulnerability of national telecommunications networks to computer viruses: Statement of Jack L. Brock, Director, Government Information ... before the Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives. [Washington, D.C.?]: The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

USAF Institute for National Security Studies., ed. Cyberterrorism and computer crimes: Issues surrounding the establishment of an international regime. [Colorado Springs], Colo: USAF Institute for National Security Studies, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Cyber security research and development: Hearing before the Committee on Science, House of Representatives, One Hundred Eighth Congress, first session, May 14, 2003. Washington: U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Science, United States Congress House Committee on. Cyber security-how can we protect American computer networks from attack?: Hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sjahdeini, Sutan Remy. Kejahatan & tindak pidana komputer. Jakarta: Grafiti, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Widodo. Memerangi cybercrime: Karakteristik, motivasi, dan strategi penanganannya dalam perspektif kriminologi. Ngaglik, Sleman, Yogyakarta: Aswaja Pressindo, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Cyber security: The challenges facing our nation in critical infrastructure protection : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, April 8, 2003. Washington: U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sjahdeini, Sutan Remy. Kejahatan & tindak pidana komputer. Jakarta: Grafiti, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Indonesia, ed. Kejahatan & tindak pidana komputer. Jakarta: Grafiti, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

United, States Congress Senate Committee on the Judiciary Subcommittee on Terrorism Technology and Homeland Security. Virtual threat, real terror: Cyberterrorism in the 21st century : hearing before the Subcommittee on Terrorism, Technology, and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, second session, February 24, 2004. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

United, States Congress House Select Committee on Homeland Security Subcommittee on Cybersecurity Science and Research and Development. Industry speaks on cybersecurity: Hearing of [sic] the Subcommittee on Cybersecurity, Science, and Research and Development before [sic] the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 15, 2003. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Who might be lurking at your cyber front door? Is your system really secure?: Strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Roger, Stull, Rodrigues R. J, Hernandez Antonio, and Pan American Health Organization, eds. Cybercrime, cyberterrorism, and cyberwarfare: Critical issues in data protection for health services information systems. Washington, D.C: Technology and Health Services Delivery, Health Services Organization Unit (THS/OS), Pan American Health Organization, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law. Computer viruses: Hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, first session, on the impact of computer viruses and other forms of computer sabotage or exploitation on computer information systems and networks, May 15, 1989. Washington: U.S. G.P.O., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Cybersecurity: Assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

United States. Congress. House. Committee on Science. Cyber security--how can we protect American computer networks from attack?: Hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Cybersecurity: Assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control. and ACM Conference on Computer and Communications Security (10th : 2003 : Washington, D.C.), eds. WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003. New York, N.Y: Association for Computing Machinery, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Cyber security R&D: Hearing before the Subcommittee on Research and Science Education, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, first session, June 10, 2009. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bing du wu qi yu wang luo zhan zheng. Beijing: Jun shi yi wen chu ban she, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Cybersecurity: Next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Lasker, G. E. Operations systems research & security of information. Tecumseh, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Cybersecurity recommendations for the next administration: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Cybersecurity recommendations for the next administration: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lasker, G. E. Operations systems research & security of information. Tecumseh, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Cybersecurity recommendations for the next administration: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Disruptive security technologies with mobile code and peer-to-peer networks. Boca Raton: CRC Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Cyber Security Research and Development Act: Report (to accompany H.R. 3394) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Cyber Security Research and Development Act: Report of the Committee on Commerce, Science, and Transportation on S. 2182. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

US GOVERNMENT. An Act to Authorize Funding for Computer and Network Security Research and Development and Research Fellowship Programs, and for Other Purposes. [Washington, D.C: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Calce, Michael. Mafiaboy: A portrait of the hacker as a young man. New York: Arcade Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Serbia) NATO Advanced Research Workshop on Managing Terrorism Threats to Critical Infrastructure - Challenges for South Eastern Europe (2014 Belgrade. Comprehensive approach as "sine qua non" for critical infrastructure protection. Amsterdam: IOS Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography