Books on the topic 'Computer security'

To see the other types of publications on this topic, follow the link: Computer security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Roberts, Ralph. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

W, Roberts D. Computer security. London: Blenheim Online Publications, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Katsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, and Christos Kalloniatis, eds. Computer Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Katsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Katsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, and Stefanos Gritzalis, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Katsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, and Steven Furnell, eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Carroll, John Millar. Computer security. 2nd ed. Boston: Butterworths, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Carroll, John Millar. Computer security. 3rd ed. Boston, Mass: Butterworth-Heinemann, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Gollmann, Dieter. Computer security. 2nd ed. Hoboken, NJ: Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Books, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gollmann, Dieter. Computer security. Chichester: Wiley, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Library of Congress. Major Issues System, ed. Computer security issues: The Computer Security Act of 1987. [Washington, D.C.]: Library of Congress, Congressional Research Service, Major Issues System, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Tiley, W. Edward. Personal computer security. Foster City, CA: IDG Books Worldwide, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

CA. Simple Computer Security. New York: John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Rak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gorodetsky, Vladimir, Igor Kotenko, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Gorodetsky, Vladimir, Igor Kotenko, and Victor A. Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Jie. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-79698-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118820650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kizza, Joseph Migga. Computer Network Security. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b106962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gorodetsky, Vladimir, Leonard Popyack, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b12005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Bosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118851678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Forcht, Karen Anne. Computer security management. Danvers, Mass: Boyd & Fraser, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hruska, Jan. Computer security solutions. Boca Raton: CRC Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Russell, Deborah. Computer security basics. Sebastopol, Calif: O'Reilly, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

E, Hutt Arthur, Bosworth Seymour, and Hoyt Douglas B, eds. Computer security handbook. 3rd ed. New York: Wiley, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Boyle, Randall J. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Watt, Steve. Computer security manager. Oxford, Eng: Elsevier Advanced Technology in association with Alkemi Ltd, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

E, Hutt Arthur, Bosworth Seymour, and Hoyt Douglas B, eds. Computer security handbook. 2nd ed. New York, N.Y: Macmillan Pub. Co., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Seymour, Bosworth, Kabay Michel E, and Whyne Eric 1981-, eds. Computer security handbook. 5th ed. Hoboken, N.J: John Wiley & Sons, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lehtinen, Rick. Computer Security Basics. 2nd ed. Sebastopol, CA: O'Reilly & Associates, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Easttom, Chuck. Computer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Konheim, Alan G. Computer security & cryptography. New Jersey: John Wiley & Sons, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Russell, Deborah. Computer Security Basics. Cambridge, MA: O'Reilly & Associates, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Baker, Richard H. Computer security handbook. 2nd ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Easttom, Chuck. Computer security fundamentals. Upper Saddle River, N.J: Pearson Prentice Hall, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Russell, Deborah. Computer security basics. Sebastopol, CA: O'Reilly & Associates, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

BOOKS, Editors of TIME-LIFE. Computer Security (Understanding Computers). Time Life UK, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography