Books on the topic 'Spyware (Computer software)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 books for your research on the topic 'Spyware (Computer software).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.
Find full textservice), SpringerLink (Online, ed. Spyware and Adware. Boston, MA: Springer Science+Business Media, LLC, 2008.
Find full textGregory, Peter H. Blocking Spam & Spyware For Dummies. New York: John Wiley & Sons, Ltd., 2005.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Spyware: What you don't know can hurt you : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, April 29, 2004. Washington: U.S. G.P.O., 2004.
Find full textJacobson, George V. Cybersecurity, botnets, and cyberterrorism. New York: Nova Science Publishers, 2009.
Find full textUnited, States Congress Senate Committee on Commerce Science and Transportation. Impact and policy implications of spyware on consumers and businesses: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008. Washington: U.S. G.P.O., 2012.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Combating spyware: H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005. Washington: U.S. G.P.O., 2005.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Manufacturing, and Trade. H.R. --------, a bill to renew the Federal Trade Commission's authority to combat cross-border spam, spyware, and fraud through reauthorization of the U.S. Safe Web Act of 2006: Hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, July 12, 2012. Washington: U.S. Government Printing Office, 2013.
Find full textBucher, Manuel. Spyware: Rechtliche Würdigung ausgewählter Fragen sowie Empfehlungen an die Praxis unter besonderer Berücksichtigung des eidgenössischen Datenschutzgesetzes. Zürich: Schulthess, 2010.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers Beyond Borders Act of 2005: Report of the Committee on Commerce, Science, and Transportation on S. 1608. Washington: U.S. G.P.O., 2006.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers Beyond Borders Act of 2005: Report of the Committee on Commerce, Science, and Transportation on S. 1608. Washington: U.S. G.P.O., 2006.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Combating spyware: H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005. Washington: U.S. G.P.O., 2005.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Combating spyware: H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005. Washington: U.S. G.P.O., 2005.
Find full textUnited States. Congress. House. Committee on the Judiciary. Internet Spyware (I-SPY) Prevention Act of 2007: Report (to accompany H.R. 1525) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.
Find full textUnited States. Congress. House. Committee on the Judiciary. Internet Spyware (I-SPY) Prevention Act of 2007: Report (to accompany H.R. 1525) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.
Find full textUnited States. Congress. House. Committee on the Judiciary. Internet Spyware (I-SPY) Prevention Act of 2007: Report (to accompany H.R. 1525) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.
Find full textUnited States. Congress. House. Committee on the Judiciary. Subcommittee on Crime, Terrorism, and Homeland Security. Internet Spyware (I-SPY) Prevention Act of 2007, and the Securing Aircraft Cockpits Against Lasers Act of 2007: Hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Tenth Congress, first session, on H.R. 1525 and H.R. 1615, May 1, 2007. Washington: U.S. G.P.O., 2008.
Find full textUnited States. Congress. House. Committee on the Judiciary. Internet Spyware (I-SPY) Prevention Act of 2007: Report (to accompany H.R. 1525) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.
Find full textFaircloth, Jeremy, and Paul Piccard. Combating Spyware in the Enterprise. Syngress, 2006.
Find full textElwins, Dannie. How to Remove and Destroy Adware and Spyware from Your Computer. Lulu Press, Inc., 2009.
Find full textErbschloe, Michael. Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code. Elsevier Science & Technology Books, 2004.
Find full textPiccard, Paul. Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat. Elsevier Science & Technology Books, 2006.
Find full textTo extend the Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers beyond Borders Act of 2006, and for other purposes: Report (to accompany H.R. 6131) (including cost estimate of the Congressional Budget Office). Washington, D.C: U.S. G.P.O., 2012.
Find full textUS GOVERNMENT. Combating Spyware: H.R. 29, the Spy ACT: Hearing Before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth. Government Printing Office, 2005.
Find full textThe U.S. SAFE WEB act: The first three years : a report to Congress. Washington, D.C.]: Federal Trade Commssion, 2009.
Find full textAlexander, Philip. Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400666087.
Full textJakubiak, David J. Smart Kid's Guide to Internet Privacy. Rosen Publishing Group, 2009.
Find full textBradley, Tony. Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security. Syngress, 2006.
Find full text