Books on the topic 'Computer security – Technological innovations'

To see the other types of publications on this topic, follow the link: Computer security – Technological innovations.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer security – Technological innovations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

The future X network: A Bell Labs perspective. Boca Raton, FL: CRC Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 2037, S. 2182, homeland security and the technology sector: Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Seventh Congress, second session, April 24, 2002. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

(Belarus), Rėspublikanskai︠a︡ navukova-tėkhnichnai︠a︡ biblii︠a︡tėka. Informat︠s︡ionnoe obespechenie strategii innovat︠s︡ionnogo razvitii︠a︡ nauki i proizvodstva: Materialy nauchno-prakticheskoĭ konferent︠s︡ii, 12-13 okti︠a︡bri︠a︡ 2010 g. Minsk: Respublikanskai︠a︡ nauchno-tekhnicheskai︠a︡ biblioteka, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schneier on security. Indianapolis, IN: Wiley Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Research and Technology, ed. Can technology protect Americans from international cybercriminals?: Joint hearing before the Subcommittee on Oversight & Subcommittee Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, second session, March 6, 2014. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wars of disruption and resilience: Cybered conflict, power, and national security. Athens: University of Georgia Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng shi xin xi hua feng xian guan li yan jiu. Beijing Shi: Jing ji ke xue chu ban she, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Science. Subcommittee on Technology. Do you know who you are doing business with?: Signatures in a digital age : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, October 28, 1997. Washington: U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1947-, Luker Mark A., Petersen Rodney J, and EDUCAUSE (Association), eds. Computer and network security in higher education. San Francisco: Jossey-Bass, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Threat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

United States. Congress. Senate. Committee on the Judiciary. The Electronic Communications Privacy Act: Promoting security and protecting privacy in the digital age : hearing before the Committee on the Judiciary, United States Senate, One Hundred Eleventh Congress, second session, September 22, 2010. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

United States. Congress. Senate. Committee on the Judiciary. The Electronic Communications Privacy Act: Government perspectives on protecting privacy in the digital age : hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, April 6, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

1961-, Drossos Lambros, ed. Digital rights management for e-commerce systems. Hershey, PA: Information Science Reference, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

!ResisTanz!: Hackeurs, les maquisards de l'innovation! : management de l'innovation, internet et déviance, apprendre et savoir intégrer les logiques hackers. Paris: Harmattan, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Design, development, and use of secure electronic voting systems. Hershey, PA: Information Science Reference, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chatelain, Yannick. !ResisTanz!: Hackeurs, les maquisards de l'innovation! : management de l'innovation, internet et déviance, apprendre et savoir intégrer les logiques hackers. Paris: Harmattan, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Marx, Gary T. Social aspects of changes in worker monitoring and computer/communications privacy and security practices. Washington: [The Office], 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Quéméner, Myriam. Criminalité économique et financière: À l'ère numérique. Paris: Economica, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

1965-, Leman-Langlois Stéphane, ed. Technocrime: Technology, crime and social control. Cullompton [England]: Willan, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Holistic approaches to cybersecurity enabling network-centric operations: Hearing before the Terrorism, Unconventional Threats, and Capabilities Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Tenth Congress, second session, hearing held, April 1, 2008. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Paul, Warren, Davies J, and Brown David 1954-, eds. ICT futures: Delivering pervasive, real-time, and secure services. Chichester, West Sussex, England: Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

IEEE International Conference on e-Technology, e-Commerce, and e-Service (2005 Hong Kong, China). The 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Service: Proceedings : Lam Woo International Conference Centre, Hong Kong Baptist University, Hong Kong, China, March 29-April 1, 2005. Los Alamitos, CA: IEEE Computer Society, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

International MCETCH Conference on e-Technologies (3rd 2008 Montreal, Que.). 2008 International MCETCH Conference on e-Technologies: 23-25 January, 2008, Montreal, Quebec, Canada : proceedings. Los Alamitos, Calif: IEEE Computer Society, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia. State of federal privacy and data security law: Lagging behind the times? : hearing before the Oversight of Government Management, the Federal Workforce, and the District of Columbia Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, July 31, 2012. Washington: U.S. Government Printing Office, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Torres, Daniel M. Federal government visions for advanced networking and digital data. Hauppauge, N.Y: Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Privacy and security for library systems. Chicago, IL: ALA TechSource, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Frameworks of IT prosumption for business development. Hershey, PA: Business Science Reference, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Halvorson, Craig S. Optics and photonics in global homeland security V and Biometric technology for human identification VI: 13-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). Bellingham, Wash: SPIE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

What facial recognition technology means for privacy and civil liberties: Hearing before the Subcommittee on Privacy, Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, second session, July 18, 2012. Washington: U.S. Government Printing Office, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Edited by Society of Photo-optical Instrumentation Engineers. Bellingham, Wash: SPIE, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Consorzio Nazionale Interuniversitario per le Telecomunicazioni, IEEE South and Central Italy Section, IEEE Communications Society, and Tirrenia International Workshop on Digital Communications (18th : 2007 : University of Padova, Italy), eds. Wireless Communications: 2007 CNIT Thyrrenian Symposium. New York: Springer Science + Business Media, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Harnessing small business innovation for national security cyber needs: Hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held July 28, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Office, General Accounting. Air traffic control: Weak computer security practices jeopardize flight safety : report to the Committee on Governmental Affairs, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, DC 20013): The Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Singh, Surjit. Innovations, finance, employment, and social security: Some views. Jaipur: Institute of Development Studies, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Nagel, A. Handwerk und Computer: Probleme und Gestaltungsmöglichkeiten im betrieblichen Innovationsprozess. Opladen: Westdeutscher Verlag, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Austin, Greg. Cybersecurity in China: The Next Wave. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Till, Steve Van. Five Technological Forces Disrupting Security: How Social, Mobile, Cloud and IoT Are Fundamentally Changing the Practice of Physical Security. Elsevier Science & Technology Books, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Petrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Petrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ke xue yan jiu yu kai fa zhong de xin xi bao zhang. Xin hua shu dian Hubei fa xing suo fa xing, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Petrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Petrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Petrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Til, Steve Van. Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT Are Transforming Physical Security in the Digital Age. Elsevier Science & Technology Books, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Weldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Weldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Weldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Weldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Weldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

US GOVERNMENT. S. 2037, S. 2182, Homeland Security and the Technology Sector: Hearing Before the Subcommittee on Science, Technology, and Space of the Committee on C. Government Printing Office, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography