Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Computer security.

Zeitschriftenartikel zum Thema „Computer security“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer security" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Nissenbaum, Helen. „Where Computer Security Meets National Security1“. Ethics and Information Technology 7, Nr. 2 (Juni 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Schmalz, Edward A. „Computer Security“. Californian Journal of Health Promotion 3, Nr. 3 (01.09.2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.

Der volle Inhalt der Quelle
Annotation:
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home. This article is a brief overview of some of the precautions that should be taken on a daily basis to protect your computer systems, files, data, and other pertinent information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Alkandary, Yaquob H. A., und Eng Fawzyeya M. A. Alhallaq. „Computer Security“. IJARCCE 5, Nr. 1 (30.01.2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

White, Richard. „Computer Security“. Urologic Clinics of North America 13, Nr. 1 (Februar 1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Lincoln, Alan Jay. „Computer Security“. Library & Archival Security 11, Nr. 1 (26.08.1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Mercuri, Rebecca T. „Computer security“. Communications of the ACM 45, Nr. 10 (Oktober 2002): 11–14. http://dx.doi.org/10.1145/570907.570917.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Dwan, Berni. „Computer security“. Computer Fraud & Security 1999, Nr. 10 (Oktober 1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Landwehr, Carl E. „Computer security“. International Journal of Information Security 1, Nr. 1 (August 2001): 3–13. http://dx.doi.org/10.1007/s102070100003.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Hinde, Stephen. „Computer security“. Computers & Security 22, Nr. 8 (Dezember 2003): 664–69. http://dx.doi.org/10.1016/s0167-4048(03)00003-8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Andrews, M., und J. A. Whittaker. „Computer security“. IEEE Security & Privacy Magazine 2, Nr. 5 (September 2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Henniker-Heaton, Yvo. „Computer security“. Computer Law & Security Review 3, Nr. 3 (September 1987): 12–13. http://dx.doi.org/10.1016/0267-3649(87)90020-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Middleton, R. A. J. „Computer security“. Computer Law & Security Review 3, Nr. 2 (Juli 1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Brimicombe, Michael. „Computer security“. Electronics Education 1996, Nr. 2 (1996): 19–23. http://dx.doi.org/10.1049/ee.1996.0041.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Saxby, S. „Computer security“. Computer Law & Security Review 22, Nr. 4 (Januar 2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Gollmann, Dieter. „Computer security“. Wiley Interdisciplinary Reviews: Computational Statistics 2, Nr. 5 (15.07.2010): 544–54. http://dx.doi.org/10.1002/wics.106.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Stosic, Lazar, und Dragan Velickovic. „Computer security and security technologies“. Journal of Process Management. New Technologies 1, Nr. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Ming, Xiaobo, Ying Chen und Jinhua Guo. „Analysis of Computer Network Information Security and Protection Strategy“. MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Der volle Inhalt der Quelle
Annotation:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Hewitt, Barbara, und Garry White. „Factors Influencing Security Incidents on Personal Computing Devices“. Journal of Organizational and End User Computing 33, Nr. 4 (Juli 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Der volle Inhalt der Quelle
Annotation:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Trcek, D. „Security Metrics Foundations for Computer Security“. Computer Journal 53, Nr. 7 (03.11.2009): 1106–12. http://dx.doi.org/10.1093/comjnl/bxp094.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Mcdowall, R. D. „Computer (in)security?1: logical security“. Quality Assurance Journal 4, Nr. 4 (2000): 197–205. http://dx.doi.org/10.1002/1099-1786(200012)4:4<197::aid-qaj114>3.0.co;2-b.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Markelova, E. B., und G. V. Popkov. „Home Computer Security“. Interexpo GEO-Siberia 6 (18.05.2022): 170–78. http://dx.doi.org/10.33764/2618-981x-2022-6-170-178.

Der volle Inhalt der Quelle
Annotation:
Our life is firmly connected with information technologies: messengers, social networks, online stores - we use all these means of communication and communication on a daily basis. That is why information security plays an important role. Taking into account the rapid development of information technologies, it is becoming increasingly difficult to protect information, which is why the need to protect a computer from unauthorized access, theft of confidential information, exposure to malware is a priority in the field of computer technology and information security. This article presents the main threats to the security of a home computer, presents the results of a comparative analysis of ways to protect a home computer from virus, spyware, hacker, advertising and spam attacks, as well as from unauthorized access to information stored on a personal computer.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Carlson, David. „Teaching computer security“. ACM SIGCSE Bulletin 36, Nr. 2 (Juni 2004): 64–67. http://dx.doi.org/10.1145/1024338.1024374.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

No Author. „Computer security news“. ACM SIGSAC Review 6, Nr. 2 (Juli 1988): 4–5. http://dx.doi.org/10.1145/62175.62177.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

W, L. „Commonsense Computer Security“. Journal of Information Technology 4, Nr. 3 (September 1989): 171–72. http://dx.doi.org/10.1057/jit.1989.26.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Churchill, Elizabeth, Les Nelson und Diana K. Smetters. „Useful Computer Security“. IEEE Internet Computing 12, Nr. 3 (Mai 2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Gengler, Barbara. „Computer security portals“. Computer Fraud & Security 1999, Nr. 2 (Februar 1999): 6–7. http://dx.doi.org/10.1016/s1361-3723(99)80002-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Wilding, Edward. „Commonsense computer security“. Computer Fraud & Security Bulletin 1990, Nr. 7 (Juli 1990): 17–18. http://dx.doi.org/10.1016/0142-0496(90)90013-b.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Williams, Paul. „Auditing Computer Security“. Computer Fraud & Security Bulletin 1990, Nr. 5 (Mai 1990): 19. http://dx.doi.org/10.1016/0142-0496(90)90057-r.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Timms, Mike. „Integrated computer security“. Computer Fraud & Security Bulletin 1990, Nr. 6 (Juni 1990): 9–14. http://dx.doi.org/10.1016/0142-0496(90)90150-j.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Smith, M. R. „Commonsense computer security“. Computer Fraud & Security Bulletin 1991, Nr. 3 (März 1991): 7–15. http://dx.doi.org/10.1016/0142-0496(91)90062-a.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Wood, Charles Cresson. „Commonsense computer security“. Computer Fraud & Security Bulletin 1994, Nr. 9 (September 1994): 17–18. http://dx.doi.org/10.1016/0142-0496(94)90186-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Collinson, Helen. „Computer security surveys“. Computer Fraud & Security Bulletin 1995, Nr. 4 (April 1995): 8–10. http://dx.doi.org/10.1016/0142-0496(95)80148-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Tomayko, J. „Anecdotes [computer security]“. IEEE Annals of the History of Computing 23, Nr. 2 (April 2001): 78–79. http://dx.doi.org/10.1109/85.929916.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Caruso, Ronald D. „Personal Computer Security“. RadioGraphics 23, Nr. 5 (September 2003): 1329–37. http://dx.doi.org/10.1148/rg.235035021.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Salton, Gerald. „Computer-security technology“. Information Processing & Management 22, Nr. 3 (Januar 1986): 269–70. http://dx.doi.org/10.1016/0306-4573(86)90059-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Kuprashvili, Henri. „Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)“. Works of Georgian Technical University, Nr. 2(524) (06.06.2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.

Der volle Inhalt der Quelle
Annotation:
The terms “kiberushishroeba” (cyber security) and “kiberusaprtkhoeba” (computer security) are often used in inappropriate contexts. The term “kiberushishroeba” is used when the avoidance of an imminent threat requires the formulation and implementation of socio-political measures (development and adoption of doctrines, laws, legal acts, improvement of the “kiberushishroeba” and “kiberusaprtkhoeba” assurance management process), because the state of protection of national interests in cyberspace is achieved through the establishment of an effective Computer Security system, cyberspace sustainability, protection from unwanted internal and external influences – as a result of qualified cyber policy. The starting-point in “kiberushishroeba” providing is political aim and the result – to achieve them. “Kiberusaprtkhoeba” is an integral component of “kiberushishroeba”, a carrier of different content and weight. “Kiberusaprtkhoeba” is a combination of technologies, methods and processes of technical protection against cyberattacks of components (networks, computers, programs, data, devices) within the field of computer and information-telecommunication. It is more associated with protection from "technical" threats (to be taken organizational-technical measures: to identify those responsible for the operation safety of the computerinformation-telecommunication field and to introduce appropriate technical infrastructure and security system) or rather to “protection of labor safety” than formulation and implementation of socio-political goals. The goal of “kiberusaprtkhoeba” is to protect them, and to achieve this protection as a whole is ensuring of the result that meets the requirements of the political goal of “kiberushishroeba”.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Klevtsov, O., A. Symonov und S. Trubchaninov. „Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment“. Nuclear and Radiation Safety, Nr. 4(88) (11.12.2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Der volle Inhalt der Quelle
Annotation:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Yemchenko, I. „Security requirements for personal computers“. Товарознавчий вісник 17, Nr. 1 (23.02.2024): 92–104. http://dx.doi.org/10.62763/ef/1.2024.92.

Der volle Inhalt der Quelle
Annotation:
The relevance of the study lies in guaranteeing the safety of personal computers for consumers (users) and complying with the requirements of technical regulations in this part. The purpose of the study was to determine and analyse the factors of personal computer assortment formation under the conditions of the uncertainty of economic and social features of modern times, with a focus on aspects of safety and environmental responsibility of computer equipment, as a priority mechanism for consumers. Emphasis is placed on cyber security, the importance of protecting a personal computer from cyber attacks. Methods of systematic analysis of statistical databases were used in the study. The high rates of development of Ukraine in the field of computerisation of many areas of industry and economy during the years 1993-2023 were noted. It has been proven that as of the year 2024 there is one personal computer, a tablet, a laptop or a netbook in every household. Changes in the economy, politics, technological aspects and other external factors that can affect the personal computer market are shown. The ability of companies to adapt to changes and requirements is noted as a key source of their success. The ergonomic, anthropological, psychophysiological requirements for screen devices that guarantee the safety of consumers (users) are given. The conditions of compliance of personal computers with the requirements of technological regulations in terms of ecodesign, aimed at improving the environmental safety component in accordance with consumer requirements, are defined. It is shown that the modern market of personal computers has several key trends in the formation of assortment policy which includes: flexible configurations and individualisation; increased attention to the gaming segment; development of artificial intelligence technologies; increasing the amount of memory and speed; environmental responsibility; development of wireless technologies; high mobility; focus on high-performance workstations. It has been determined that compliance with environmental safety requirements is important for business, because companies that pay attention to environmentally responsible may have a competitive advantage. It is shown that the most common are the standards and certification systems for personal computers, which are a series of certification standards that determine the requirements for the environmental and ergonomic quality of computer equipment, in particular, monitors. The practical significance of the results lies in increasing of the competitiveness of personal computers, taking into account the safety recommendations for consumers (users) of the relevant equipment to strengthen the role of environmental aspects and cyber security requirements
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Ahmadian Ramaki, Ali. „Language-Based Security to Apply Computer Security“. International Journal on Cryptography and Information Security 2, Nr. 3 (30.09.2012): 37–47. http://dx.doi.org/10.5121/ijcis.2012.2303.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Kwiatkowski, Feliks, und Alistair Kelman. „Computer security: Readings from security management magazine“. Computer Fraud & Security Bulletin 9, Nr. 9 (Juli 1987): 13–14. http://dx.doi.org/10.1016/0142-0496(87)90104-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Coronado, Adolfo S. „Principles of Computer Security: CompTIA Security+™“. Journal of Information Privacy and Security 9, Nr. 1 (Januar 2013): 70–72. http://dx.doi.org/10.1080/15536548.2013.10845674.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

CERNOV, Ana-Maria. „Security in Computer Networks“. International Journal of Information Security and Cybercrime 7, Nr. 1 (29.06.2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Der volle Inhalt der Quelle
Annotation:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Bella, Giampaolo, und Peter Y. A. Ryan. „Journal of Computer Security“. Journal of Computer Security 17, Nr. 3 (15.04.2009): 237. http://dx.doi.org/10.3233/jcs-2009-0346.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Peterson, I. „Federal Computer Security Concerns“. Science News 128, Nr. 15 (12.10.1985): 230. http://dx.doi.org/10.2307/3969834.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Moore, G. „Security for Computer Networks“. Electronics and Power 31, Nr. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Branstad, D. „Guest editorial - Computer security“. IEEE Communications Magazine 23, Nr. 7 (Juli 1985): 10–11. http://dx.doi.org/10.1109/mcom.1985.1092611.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Dhillon, Gurpreet. „Computer Security within Organizations“. European Journal of Information Systems 3, Nr. 3 (Juli 1994): 241–42. http://dx.doi.org/10.1057/ejis.1994.25.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Wong, Ken. „Effective Computer Security Management“. EDPACS 14, Nr. 1 (Juli 1986): 7–10. http://dx.doi.org/10.1080/07366988609452212.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Middleton, R. „Computer security: the evidence“. Computer Bulletin 37, Nr. 6 (01.12.1995): 2–4. http://dx.doi.org/10.1093/combul/37.6.2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Guynes, Steve. „Security of computer software“. ACM SIGSAC Review 3, Nr. 2-4 (September 1985): 31–35. http://dx.doi.org/10.1145/1058406.1058410.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie