Books on the topic 'Computer security – Technological innovations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer security – Technological innovations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
The future X network: A Bell Labs perspective. Boca Raton, FL: CRC Press, 2015.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 2037, S. 2182, homeland security and the technology sector: Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Seventh Congress, second session, April 24, 2002. Washington: U.S. G.P.O., 2004.
Find full text(Belarus), Rėspublikanskai︠a︡ navukova-tėkhnichnai︠a︡ biblii︠a︡tėka. Informat︠s︡ionnoe obespechenie strategii innovat︠s︡ionnogo razvitii︠a︡ nauki i proizvodstva: Materialy nauchno-prakticheskoĭ konferent︠s︡ii, 12-13 okti︠a︡bri︠a︡ 2010 g. Minsk: Respublikanskai︠a︡ nauchno-tekhnicheskai︠a︡ biblioteka, 2010.
Find full textSchneier on security. Indianapolis, IN: Wiley Pub., 2008.
Find full textUnited States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Research and Technology, ed. Can technology protect Americans from international cybercriminals?: Joint hearing before the Subcommittee on Oversight & Subcommittee Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, second session, March 6, 2014. Washington: U.S. Government Printing Office, 2014.
Find full textWars of disruption and resilience: Cybered conflict, power, and national security. Athens: University of Georgia Press, 2011.
Find full textCheng shi xin xi hua feng xian guan li yan jiu. Beijing Shi: Jing ji ke xue chu ban she, 2011.
Find full textUnited States. Congress. House. Committee on Science. Subcommittee on Technology. Do you know who you are doing business with?: Signatures in a digital age : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, October 28, 1997. Washington: U.S. G.P.O., 1998.
Find full text1947-, Luker Mark A., Petersen Rodney J, and EDUCAUSE (Association), eds. Computer and network security in higher education. San Francisco: Jossey-Bass, 2003.
Find full textThreat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. The Electronic Communications Privacy Act: Promoting security and protecting privacy in the digital age : hearing before the Committee on the Judiciary, United States Senate, One Hundred Eleventh Congress, second session, September 22, 2010. Washington: U.S. G.P.O., 2011.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. The Electronic Communications Privacy Act: Government perspectives on protecting privacy in the digital age : hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, April 6, 2011. Washington: U.S. G.P.O., 2011.
Find full text1961-, Drossos Lambros, ed. Digital rights management for e-commerce systems. Hershey, PA: Information Science Reference, 2009.
Find full text!ResisTanz!: Hackeurs, les maquisards de l'innovation! : management de l'innovation, internet et déviance, apprendre et savoir intégrer les logiques hackers. Paris: Harmattan, 2009.
Find full textDesign, development, and use of secure electronic voting systems. Hershey, PA: Information Science Reference, 2014.
Find full textChatelain, Yannick. !ResisTanz!: Hackeurs, les maquisards de l'innovation! : management de l'innovation, internet et déviance, apprendre et savoir intégrer les logiques hackers. Paris: Harmattan, 2009.
Find full textMarx, Gary T. Social aspects of changes in worker monitoring and computer/communications privacy and security practices. Washington: [The Office], 1986.
Find full textQuéméner, Myriam. Criminalité économique et financière: À l'ère numérique. Paris: Economica, 2015.
Find full text1965-, Leman-Langlois Stéphane, ed. Technocrime: Technology, crime and social control. Cullompton [England]: Willan, 2008.
Find full textHolistic approaches to cybersecurity enabling network-centric operations: Hearing before the Terrorism, Unconventional Threats, and Capabilities Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Tenth Congress, second session, hearing held, April 1, 2008. Washington: U.S. G.P.O., 2009.
Find full textPaul, Warren, Davies J, and Brown David 1954-, eds. ICT futures: Delivering pervasive, real-time, and secure services. Chichester, West Sussex, England: Wiley, 2008.
Find full textIEEE International Conference on e-Technology, e-Commerce, and e-Service (2005 Hong Kong, China). The 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Service: Proceedings : Lam Woo International Conference Centre, Hong Kong Baptist University, Hong Kong, China, March 29-April 1, 2005. Los Alamitos, CA: IEEE Computer Society, 2005.
Find full textInternational MCETCH Conference on e-Technologies (3rd 2008 Montreal, Que.). 2008 International MCETCH Conference on e-Technologies: 23-25 January, 2008, Montreal, Quebec, Canada : proceedings. Los Alamitos, Calif: IEEE Computer Society, 2007.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia. State of federal privacy and data security law: Lagging behind the times? : hearing before the Oversight of Government Management, the Federal Workforce, and the District of Columbia Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, July 31, 2012. Washington: U.S. Government Printing Office, 2012.
Find full textTorres, Daniel M. Federal government visions for advanced networking and digital data. Hauppauge, N.Y: Nova Science Publishers, 2011.
Find full textPrivacy and security for library systems. Chicago, IL: ALA TechSource, 2016.
Find full textFrameworks of IT prosumption for business development. Hershey, PA: Business Science Reference, 2014.
Find full textHalvorson, Craig S. Optics and photonics in global homeland security V and Biometric technology for human identification VI: 13-16 April 2009, Orlando, Florida, United States. Edited by SPIE (Society). Bellingham, Wash: SPIE, 2009.
Find full textWhat facial recognition technology means for privacy and civil liberties: Hearing before the Subcommittee on Privacy, Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, second session, July 18, 2012. Washington: U.S. Government Printing Office, 2012.
Find full textKim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Edited by Society of Photo-optical Instrumentation Engineers. Bellingham, Wash: SPIE, 2008.
Find full textConsorzio Nazionale Interuniversitario per le Telecomunicazioni, IEEE South and Central Italy Section, IEEE Communications Society, and Tirrenia International Workshop on Digital Communications (18th : 2007 : University of Padova, Italy), eds. Wireless Communications: 2007 CNIT Thyrrenian Symposium. New York: Springer Science + Business Media, 2008.
Find full textHarnessing small business innovation for national security cyber needs: Hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held July 28, 2010. Washington: U.S. G.P.O., 2010.
Find full textOffice, General Accounting. Air traffic control: Weak computer security practices jeopardize flight safety : report to the Committee on Governmental Affairs, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, DC 20013): The Office, 1998.
Find full textSingh, Surjit. Innovations, finance, employment, and social security: Some views. Jaipur: Institute of Development Studies, 2013.
Find full textNagel, A. Handwerk und Computer: Probleme und Gestaltungsmöglichkeiten im betrieblichen Innovationsprozess. Opladen: Westdeutscher Verlag, 1992.
Find full textAustin, Greg. Cybersecurity in China: The Next Wave. Springer, 2018.
Find full textTill, Steve Van. Five Technological Forces Disrupting Security: How Social, Mobile, Cloud and IoT Are Fundamentally Changing the Practice of Physical Security. Elsevier Science & Technology Books, 2017.
Find full textPetrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2018.
Find full textPetrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2018.
Find full textKe xue yan jiu yu kai fa zhong de xin xi bao zhang. Xin hua shu dian Hubei fa xing suo fa xing, 1998.
Find full textPetrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2022.
Find full textPetrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2022.
Find full textPetrenko, Sergei. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. River Publishers, 2022.
Find full textTil, Steve Van. Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT Are Transforming Physical Security in the Digital Age. Elsevier Science & Technology Books, 2017.
Find full textWeldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.
Find full textWeldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.
Find full textWeldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.
Find full textWeldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.
Find full textWeldon, Marcus K. Future X Network: A Bell Labs Perspective. Taylor & Francis Group, 2018.
Find full textUS GOVERNMENT. S. 2037, S. 2182, Homeland Security and the Technology Sector: Hearing Before the Subcommittee on Science, Technology, and Space of the Committee on C. Government Printing Office, 2004.
Find full text