Segui questo link per vedere altri tipi di pubblicazioni sul tema: Computer security.

Articoli di riviste sul tema "Computer security"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Computer security".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Kubarenko, Anna, and Pēteris Grabusts. "COMPYTER SYSTEMS SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 20 (April 20, 2016): 129–33. http://dx.doi.org/10.17770/het2016.20.3547.

Testo completo
Abstract (sommario):
The author in this work provides insight into computer systems security. Themes which are discussed is hardware security, logical security, viruses and computer protection. Nowadays computers are a part of daily life, so each user how to know how to protect computer and its data.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Schmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.

Testo completo
Abstract (sommario):
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home. This article is a brief overview of some of the precautions that should be taken on a daily basis to protect your computer systems, files, data, and other pertinent information.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Alkandary, Yaquob H. A., and Eng Fawzyeya M. A. Alhallaq. "Computer Security." IJARCCE 5, no. 1 (2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

White, Richard. "Computer Security." Urologic Clinics of North America 13, no. 1 (1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Lincoln, Alan Jay. "Computer Security." Library & Archival Security 11, no. 1 (1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Glīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.

Testo completo
Abstract (sommario):
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Mercuri, Rebecca T. "Computer security." Communications of the ACM 45, no. 10 (2002): 11–14. http://dx.doi.org/10.1145/570907.570917.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Dwan, Berni. "Computer security." Computer Fraud & Security 1999, no. 10 (1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Landwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (2001): 3–13. http://dx.doi.org/10.1007/s102070100003.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Hinde, Stephen. "Computer security." Computers & Security 22, no. 8 (2003): 664–69. http://dx.doi.org/10.1016/s0167-4048(03)00003-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Andrews, M., and J. A. Whittaker. "Computer security." IEEE Security & Privacy Magazine 2, no. 5 (2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Henniker-Heaton, Yvo. "Computer security." Computer Law & Security Review 3, no. 3 (1987): 12–13. http://dx.doi.org/10.1016/0267-3649(87)90020-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Middleton, R. A. J. "Computer security." Computer Law & Security Review 3, no. 2 (1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Brimicombe, Michael. "Computer security." Electronics Education 1996, no. 2 (1996): 19–23. http://dx.doi.org/10.1049/ee.1996.0041.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Saxby, S. "Computer security." Computer Law & Security Review 22, no. 4 (2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Gollmann, Dieter. "Computer security." Wiley Interdisciplinary Reviews: Computational Statistics 2, no. 5 (2010): 544–54. http://dx.doi.org/10.1002/wics.106.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Zhang, Guo-Liang. "Analysing Computer System Security and Computer Network Security." Engineering Technology Trends 2, no. 4 (2024): 0. http://dx.doi.org/10.37155/2972-483x-0204-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Suleymanova, Myalkhazni L., and Olga Yu Yanova. "RESEARCH IN THE FIELD OF COMPUTER SECURITY AND PREVENTION OF COMPUTER VIRUSES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/7, no. 153 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2024.12.07.006.

Testo completo
Abstract (sommario):
With the rapid development of computer technology, the use of computers is becoming more common. However, at the same time, computer security problems are becoming more serious. Computer viruses always threaten people’s computer security. To effectively solve this problem, this article first analyzes computer security issues, then explains the main characteristics of computer viruses, and finally conducts a series of discussions on how to improve computer security.
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Stosic, Lazar, and Dragan Velickovic. "Computer security and security technologies." Journal of Process Management. New Technologies 1, no. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Ali, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.

Testo completo
Abstract (sommario):
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Testo completo
Abstract (sommario):
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Zizaeva, Ana, Yakha A. Khadueva, and Olga A. Pyrnova. "APPLICATION OF INFORMATION SECURITY IN COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1/10, no. 154 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2025.01.10.006.

Testo completo
Abstract (sommario):
The information age has arrived, and the Internet has become an important part of life. Computers have become an important tool in daily work, study, entertainment, etc., changing our lives. However, in the process of widespread use of computers and networks, security issues have also become an important obstacle to their development. Problems such as computer viruses, confidential information leaks, and hacker intrusions have caused economic and property damage to computer users. This article mainly explains the basic contents of computer network security and virtual network technology, as we
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Ali, Ahmadian Ramaki, and Ebrahimi Atani Reza. "LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3532949.

Testo completo
Abstract (sommario):
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Testo completo
Abstract (sommario):
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Trcek, D. "Security Metrics Foundations for Computer Security." Computer Journal 53, no. 7 (2009): 1106–12. http://dx.doi.org/10.1093/comjnl/bxp094.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Mcdowall, R. D. "Computer (in)security?1: logical security." Quality Assurance Journal 4, no. 4 (2000): 197–205. http://dx.doi.org/10.1002/1099-1786(200012)4:4<197::aid-qaj114>3.0.co;2-b.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Markelova, E. B., and G. V. Popkov. "Home Computer Security." Interexpo GEO-Siberia 6 (May 18, 2022): 170–78. http://dx.doi.org/10.33764/2618-981x-2022-6-170-178.

Testo completo
Abstract (sommario):
Our life is firmly connected with information technologies: messengers, social networks, online stores - we use all these means of communication and communication on a daily basis. That is why information security plays an important role. Taking into account the rapid development of information technologies, it is becoming increasingly difficult to protect information, which is why the need to protect a computer from unauthorized access, theft of confidential information, exposure to malware is a priority in the field of computer technology and information security. This article presents the m
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Carlson, David. "Teaching computer security." ACM SIGCSE Bulletin 36, no. 2 (2004): 64–67. http://dx.doi.org/10.1145/1024338.1024374.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

No Author. "Computer security news." ACM SIGSAC Review 6, no. 2 (1988): 4–5. http://dx.doi.org/10.1145/62175.62177.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

W, L. "Commonsense Computer Security." Journal of Information Technology 4, no. 3 (1989): 171–72. http://dx.doi.org/10.1057/jit.1989.26.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Churchill, Elizabeth, Les Nelson, and Diana K. Smetters. "Useful Computer Security." IEEE Internet Computing 12, no. 3 (2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Gengler, Barbara. "Computer security portals." Computer Fraud & Security 1999, no. 2 (1999): 6–7. http://dx.doi.org/10.1016/s1361-3723(99)80002-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Wilding, Edward. "Commonsense computer security." Computer Fraud & Security Bulletin 1990, no. 7 (1990): 17–18. http://dx.doi.org/10.1016/0142-0496(90)90013-b.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Williams, Paul. "Auditing Computer Security." Computer Fraud & Security Bulletin 1990, no. 5 (1990): 19. http://dx.doi.org/10.1016/0142-0496(90)90057-r.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Timms, Mike. "Integrated computer security." Computer Fraud & Security Bulletin 1990, no. 6 (1990): 9–14. http://dx.doi.org/10.1016/0142-0496(90)90150-j.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Smith, M. R. "Commonsense computer security." Computer Fraud & Security Bulletin 1991, no. 3 (1991): 7–15. http://dx.doi.org/10.1016/0142-0496(91)90062-a.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Wood, Charles Cresson. "Commonsense computer security." Computer Fraud & Security Bulletin 1994, no. 9 (1994): 17–18. http://dx.doi.org/10.1016/0142-0496(94)90186-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Collinson, Helen. "Computer security surveys." Computer Fraud & Security Bulletin 1995, no. 4 (1995): 8–10. http://dx.doi.org/10.1016/0142-0496(95)80148-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Tomayko, J. "Anecdotes [computer security]." IEEE Annals of the History of Computing 23, no. 2 (2001): 78–79. http://dx.doi.org/10.1109/85.929916.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Caruso, Ronald D. "Personal Computer Security." RadioGraphics 23, no. 5 (2003): 1329–37. http://dx.doi.org/10.1148/rg.235035021.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Salton, Gerald. "Computer-security technology." Information Processing & Management 22, no. 3 (1986): 269–70. http://dx.doi.org/10.1016/0306-4573(86)90059-2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Narendra, Kumar Chahar. "Computer Network Security." International Journal of Innovative Science and Research Technology 7, no. 3 (2022): 1031–34. https://doi.org/10.5281/zenodo.6448170.

Testo completo
Abstract (sommario):
Network security is becoming increasingly important to personal computer users, businesses, and the military. Security became a major concern with the advent of the internet, and understanding the history of security allows a better understanding of the emergence of security technology. Many security threats can occur due to the structure of the internet. If the internet&#39;s architecture is changed, it can reduce the number of possible attacks that can be sent across the network. Knowing the attack methods enables us to respond with adequate security. Many businesses use firewalls and encryp
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Yemchenko, I. "Security requirements for personal computers." Товарознавчий вісник 17, no. 1 (2024): 92–104. http://dx.doi.org/10.62763/ef/1.2024.92.

Testo completo
Abstract (sommario):
The relevance of the study lies in guaranteeing the safety of personal computers for consumers (users) and complying with the requirements of technical regulations in this part. The purpose of the study was to determine and analyse the factors of personal computer assortment formation under the conditions of the uncertainty of economic and social features of modern times, with a focus on aspects of safety and environmental responsibility of computer equipment, as a priority mechanism for consumers. Emphasis is placed on cyber security, the importance of protecting a personal computer from cybe
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Testo completo
Abstract (sommario):
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&amp;C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&amp;C systems, especially the assessment of cyber threats, vulnerabilities of I&amp;C computer security, sufficiency of applied measures for ensuring I&amp;C systems computer security, risks of I&amp;C system computer security as well as periodic reassessment of I&amp;C computer security. The paper considers the assessment of I&amp;C computer security vulnerabi
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Kuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.

Testo completo
Abstract (sommario):
The terms “kiberushishroeba” (cyber security) and “kiberusaprtkhoeba” (computer security) are often used in inappropriate contexts. The term “kiberushishroeba” is used when the avoidance of an imminent threat requires the formulation and implementation of socio-political measures (development and adoption of doctrines, laws, legal acts, improvement of the “kiberushishroeba” and “kiberusaprtkhoeba” assurance management process), because the state of protection of national interests in cyberspace is achieved through the establishment of an effective Computer Security system, cyberspace sustainab
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Ahmadian Ramaki, Ali. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security 2, no. 3 (2012): 37–47. http://dx.doi.org/10.5121/ijcis.2012.2303.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Kwiatkowski, Feliks, and Alistair Kelman. "Computer security: Readings from security management magazine." Computer Fraud & Security Bulletin 9, no. 9 (1987): 13–14. http://dx.doi.org/10.1016/0142-0496(87)90104-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Coronado, Adolfo S. "Principles of Computer Security: CompTIA Security+™." Journal of Information Privacy and Security 9, no. 1 (2013): 70–72. http://dx.doi.org/10.1080/15536548.2013.10845674.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
50

CERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Testo completo
Abstract (sommario):
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!