To see the other types of publications on this topic, follow the link: COMPUTERS / Security / Viruses.

Books on the topic 'COMPUTERS / Security / Viruses'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'COMPUTERS / Security / Viruses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

D, Zhikov︠t︡sev M., ed. "Gl︠i︡uki", sboi i oshibki kompʹ︠i︡utera: Reshaem problemy sami. 2nd ed. Sankt-Peterburg: "Nauka i Tekhnika", 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

F, Hempelmann Christian, Raskin Victor, and Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., eds. New Security Paradigms Workshop: Proceedings, September 23-26, 2002, Virginia Beach, VA. New York, N.Y: Association for Computing Machinery, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United, States Congress House Committee on Government Reform Subcommittee on Technology Information Policy Intergovernmental Relations and the Census. Worm and virus defense: How can we protect the nation's computers from these threats? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 10, 2003. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hei ke jun tuan. Beijing: Jun shi ke xue chu ban she, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kennedy, David. Metasploit: The penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The tangled Web: A guide to securing modern Web applications. San Francisco: No Starch Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Metasploit: A penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Services, University of Sheffield Academic Computing. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

University of Sheffield. Academic Computing Services. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

University of Sheffield. Academic Computing Services. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Shea, John M. Combating computer viruses. New York: Gareth Stevens, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Robert, Slade, and Gattiker Urs E, eds. Viruses revealed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Rhodes, Keith A. Information security: The proposed Computer Security Enhancement Act of 1999 : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Day-MacLeod, Deirdre. Viruses and spam. New York: Rosen Central, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Eoghan, Casey, and Aquilina James M, eds. Malware forensics field guide for Windows systems: Digital forensics field guides. Waltham, MA: Syngress, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rhodes, Keith A. Information security: The Melissa computer virus demonstrates urgent need for stronger protection over systems and sensitive data : statement of Keith A. Rhodes, Technical Director for Computers and Telecommunications, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Parikka, Jussi. Digital contagions: A media archaeology of computer viruses. New York: Peter Lang, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Canada. Public Works and Government Services Canada. Terminology and Documentation Directorate., ed. Vocabulaire de la sécurité et des virus informatiques =: Vocabulary of computer security and viruses. [Ottawa]: Public Works and Government Services Canada, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Office, General Accounting. Computer security: DEA is not adequately protecting national security information : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Walker, Andy. Absolute beginner's guide to security, spam, spyware & viruses. Indianapolis, Ind: Que, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Absolute beginner's guide to security, spam, spyware and viruses. Indianapolis, Ind: Que, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

The art of computer virus research and defense. Upper Saddle River, NJ: Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Denning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Denning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

(Firm), Price Waterhouse. The Price Waterhouse - Priority Data Systems computer virus and security survey - February 1995. Dublin: Price Waterhouse, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Seven deadliest Microsoft attacks. Amsterdam: Syngress/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Malicious Mobile Code: Virus Protection for Windows. Sebastopol, CA: O'Reilly & Associates, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

T, Polk William. A guide to the selection of anti-virus tools and techniques. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Green, James L. The " Father Christmas Worm". [Washington, DC: National Aeronautics and Space Administration, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Privacy, security, and cyberspace. New York, NY: Facts On File, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Duntemann, Jeff. Degunking your email, spam, and viruses. Scottsdale, Ariz: Paraglyph Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Office, General Accounting. Computer security: Virus highlights need for improved Internet management : report to the chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives. Washington, D.C: GAO, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Yunkai, Zhu, and Xiong Jie, eds. Zhongguo hei ke nei mu: Chinese harker [i.e. hacker] : unmasking. Beijing: Min zhu yu jian she chu ban she, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Division, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Office of Personnel Management. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Office, General Accounting. Computer security: Governmentwide planning process had limited impact : report to the chairman, Committee on Science, Space, and Technology, House of Representatives. Washington, D.C: U.S. General Accounting Office, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kane, Pamela. PC security and virus protection: The ongoing war against information sabotage. New York: M&T Books, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Office, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Office, General Accounting. Computer security: FAA is addressing personnel weaknesses, but further action is required : report to the Chairman and Ranking Minority Member, Committee on Science, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): U.S. General Accounting Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Office, General Accounting. Computer security: FAA needs to improve controls over use of foreign nationals to remediate and review software : report to the Chairman, Committee on Science, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Simons, G. L. Viruses, bugs and Star Wars: The hazards of unsafe computing. Manchester: NCC Blackwell, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Technology, United States Congress House Committee on Science Subcommittee on. The Melissa virus: Inoculating our information technology from emerging threats : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Sixth Congress, first session, April 15, 1999. Washington, DC: [U.S. G.P.O.], 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

United, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Are we prepared for cyberwar? : hearing before ... 106th Congress, 2nd session, March 9, 2000. Washingotn, DC: U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

United, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. Washington, DC: U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control. and ACM Conference on Computer and Communications Security (10th : 2003 : Washington, D.C.), eds. WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003. New York, N.Y: Association for Computing Machinery, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Brock, Jack L. November 1988 Internet computer virus and the vulnerability of national telecommunications networks to computer viruses: Statement of Jack L. Brock, Director, Government Information ... before the Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives. [Washington, D.C.?]: The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography