To see the other types of publications on this topic, follow the link: Spyware (Computer software).

Books on the topic 'Spyware (Computer software)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 32 books for your research on the topic 'Spyware (Computer software).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

S, Yang John, ed. Spyware. New York: Nova Science Publishers, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

service), SpringerLink (Online, ed. Spyware and Adware. Boston, MA: Springer Science+Business Media, LLC, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gregory, Peter H. Blocking Spam & Spyware For Dummies. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Spyware: What you don't know can hurt you : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, April 29, 2004. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jacobson, George V. Cybersecurity, botnets, and cyberterrorism. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United, States Congress Senate Committee on Commerce Science and Transportation. Impact and policy implications of spyware on consumers and businesses: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Energy and Commerce. Combating spyware: H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005. Washington: U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Manufacturing, and Trade. H.R. --------, a bill to renew the Federal Trade Commission's authority to combat cross-border spam, spyware, and fraud through reauthorization of the U.S. Safe Web Act of 2006: Hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, July 12, 2012. Washington: U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bucher, Manuel. Spyware: Rechtliche Würdigung ausgewählter Fragen sowie Empfehlungen an die Praxis unter besonderer Berücksichtigung des eidgenössischen Datenschutzgesetzes. Zürich: Schulthess, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers Beyond Borders Act of 2005: Report of the Committee on Commerce, Science, and Transportation on S. 1608. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers Beyond Borders Act of 2005: Report of the Committee on Commerce, Science, and Transportation on S. 1608. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

United States. Congress. House. Committee on Energy and Commerce. Combating spyware: H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005. Washington: U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

United States. Congress. House. Committee on Energy and Commerce. Combating spyware: H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005. Washington: U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

United States. Congress. House. Committee on the Judiciary. Internet Spyware (I-SPY) Prevention Act of 2007: Report (to accompany H.R. 1525) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

United States. Congress. House. Committee on the Judiciary. Internet Spyware (I-SPY) Prevention Act of 2007: Report (to accompany H.R. 1525) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

United States. Congress. House. Committee on the Judiciary. Internet Spyware (I-SPY) Prevention Act of 2007: Report (to accompany H.R. 1525) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime, Terrorism, and Homeland Security. Internet Spyware (I-SPY) Prevention Act of 2007, and the Securing Aircraft Cockpits Against Lasers Act of 2007: Hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Tenth Congress, first session, on H.R. 1525 and H.R. 1615, May 1, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

United States. Congress. House. Committee on the Judiciary. Internet Spyware (I-SPY) Prevention Act of 2007: Report (to accompany H.R. 1525) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wellmeyer, Matthias. Spyware Development and Analysis. GRIN Verlag GmbH, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Faircloth, Jeremy, and Paul Piccard. Combating Spyware in the Enterprise. Syngress, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Tittel, Ed. PC Magazine Fighting Spyware, Viruses, and Malware. Wiley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Aycock, John. Spyware and Adware. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Elwins, Dannie. How to Remove and Destroy Adware and Spyware from Your Computer. Lulu Press, Inc., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Erbschloe, Michael. Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code. Elsevier Science & Technology Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Piccard, Paul. Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat. Elsevier Science & Technology Books, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

To extend the Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers beyond Borders Act of 2006, and for other purposes: Report (to accompany H.R. 6131) (including cost estimate of the Congressional Budget Office). Washington, D.C: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

US GOVERNMENT. Combating Spyware: H.R. 29, the Spy ACT: Hearing Before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth. Government Printing Office, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

The U.S. SAFE WEB act: The first three years : a report to Congress. Washington, D.C.]: Federal Trade Commssion, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Alexander, Philip. Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400666087.

Full text
Abstract:
In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions of various kinds. Many people, especially nonprofessional administrators of home or small business networks, feel helpless. In this book, technical security expert Philip Alexander explains in layman's terms how to keep networks and individual computers safe from the bad guys. In presenting solutions to these problems and many others, the book is a lifeline to those who know their computer systems are vulnerable to smart thieves and hackers—not to mention tech-savvy kids or employees who are swapping music files, stealing software, or otherwise making a mockery of the word security. In his job protecting data and combating financial fraud, Philip Alexander knows well which power tools are required to keep hackers and thieves at bay. With his gift for putting technical solutions in everyday language, Alexander helps readers with home and/or small business networks protect their data, their identities, and their privacy using the latest techniques. In addition, readers will learn how to protect PDAs and smartphones, how to make hardware thefts more unlikely, how to sniff out scammers and the motives of offshore tech support personnel who ask too many questions, and how to keep personal information safer when shopping over the Internet or telephone.
APA, Harvard, Vancouver, ISO, and other styles
31

Jakubiak, David J. Smart Kid's Guide to Internet Privacy. Rosen Publishing Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bradley, Tony. Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security. Syngress, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography