Books on the topic 'COMPUTERS / Security / Viruses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'COMPUTERS / Security / Viruses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.
Find full textD, Zhikov︠t︡sev M., ed. "Gl︠i︡uki", sboi i oshibki kompʹ︠i︡utera: Reshaem problemy sami. 2nd ed. Sankt-Peterburg: "Nauka i Tekhnika", 2013.
Find full textF, Hempelmann Christian, Raskin Victor, and Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., eds. New Security Paradigms Workshop: Proceedings, September 23-26, 2002, Virginia Beach, VA. New York, N.Y: Association for Computing Machinery, 2002.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Technology Information Policy Intergovernmental Relations and the Census. Worm and virus defense: How can we protect the nation's computers from these threats? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 10, 2003. Washington: U.S. G.P.O., 2004.
Find full textKennedy, David. Metasploit: The penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.
Find full textThe tangled Web: A guide to securing modern Web applications. San Francisco: No Starch Press, 2011.
Find full textMetasploit: A penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.
Find full textServices, University of Sheffield Academic Computing. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1995.
Find full textUniversity of Sheffield. Academic Computing Services. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1996.
Find full textUniversity of Sheffield. Academic Computing Services. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1996.
Find full textRobert, Slade, and Gattiker Urs E, eds. Viruses revealed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Find full textRhodes, Keith A. Information security: The proposed Computer Security Enhancement Act of 1999 : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.
Find full textEoghan, Casey, and Aquilina James M, eds. Malware forensics field guide for Windows systems: Digital forensics field guides. Waltham, MA: Syngress, 2012.
Find full textRhodes, Keith A. Information security: The Melissa computer virus demonstrates urgent need for stronger protection over systems and sensitive data : statement of Keith A. Rhodes, Technical Director for Computers and Telecommunications, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.
Find full textParikka, Jussi. Digital contagions: A media archaeology of computer viruses. New York: Peter Lang, 2007.
Find full textCanada. Public Works and Government Services Canada. Terminology and Documentation Directorate., ed. Vocabulaire de la sécurité et des virus informatiques =: Vocabulary of computer security and viruses. [Ottawa]: Public Works and Government Services Canada, 1995.
Find full textOffice, General Accounting. Computer security: DEA is not adequately protecting national security information : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.
Find full textWalker, Andy. Absolute beginner's guide to security, spam, spyware & viruses. Indianapolis, Ind: Que, 2006.
Find full textOffice, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Find full textAbsolute beginner's guide to security, spam, spyware and viruses. Indianapolis, Ind: Que, 2005.
Find full textThe art of computer virus research and defense. Upper Saddle River, NJ: Addison-Wesley, 2005.
Find full textDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Find full text(Firm), Price Waterhouse. The Price Waterhouse - Priority Data Systems computer virus and security survey - February 1995. Dublin: Price Waterhouse, 1995.
Find full textMalicious Mobile Code: Virus Protection for Windows. Sebastopol, CA: O'Reilly & Associates, 2001.
Find full textT, Polk William. A guide to the selection of anti-virus tools and techniques. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1992.
Find full textGreen, James L. The " Father Christmas Worm". [Washington, DC: National Aeronautics and Space Administration, 1989.
Find full textDuntemann, Jeff. Degunking your email, spam, and viruses. Scottsdale, Ariz: Paraglyph Press, 2004.
Find full textOffice, General Accounting. Computer security: Virus highlights need for improved Internet management : report to the chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives. Washington, D.C: GAO, 1989.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textPC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.
Find full textYunkai, Zhu, and Xiong Jie, eds. Zhongguo hei ke nei mu: Chinese harker [i.e. hacker] : unmasking. Beijing: Min zhu yu jian she chu ban she, 2001.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Office of Personnel Management. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textOffice, General Accounting. Computer security: Governmentwide planning process had limited impact : report to the chairman, Committee on Science, Space, and Technology, House of Representatives. Washington, D.C: U.S. General Accounting Office, 1990.
Find full textKane, Pamela. PC security and virus protection: The ongoing war against information sabotage. New York: M&T Books, 1994.
Find full textOffice, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.
Find full textOffice, General Accounting. Computer security: FAA is addressing personnel weaknesses, but further action is required : report to the Chairman and Ranking Minority Member, Committee on Science, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): U.S. General Accounting Office, 2000.
Find full textOffice, General Accounting. Computer security: FAA needs to improve controls over use of foreign nationals to remediate and review software : report to the Chairman, Committee on Science, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textSimons, G. L. Viruses, bugs and Star Wars: The hazards of unsafe computing. Manchester: NCC Blackwell, 1989.
Find full textTechnology, United States Congress House Committee on Science Subcommittee on. The Melissa virus: Inoculating our information technology from emerging threats : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Sixth Congress, first session, April 15, 1999. Washington, DC: [U.S. G.P.O.], 1999.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Are we prepared for cyberwar? : hearing before ... 106th Congress, 2nd session, March 9, 2000. Washingotn, DC: U.S. G.P.O., 2000.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. Washington, DC: U.S. G.P.O., 2001.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and ACM Conference on Computer and Communications Security (10th : 2003 : Washington, D.C.), eds. WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003. New York, N.Y: Association for Computing Machinery, 2003.
Find full textBrock, Jack L. November 1988 Internet computer virus and the vulnerability of national telecommunications networks to computer viruses: Statement of Jack L. Brock, Director, Government Information ... before the Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives. [Washington, D.C.?]: The Office, 1989.
Find full text