Books on the topic 'Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Roberts, Ralph. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.
W, Roberts D. Computer security. London: Blenheim Online Publications, 1990.
Hollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Katsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, and Christos Kalloniatis, eds. Computer Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Katsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Fournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Lopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Lopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Boureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Katsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, and Stefanos Gritzalis, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Katsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, and Steven Furnell, eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0.
Hollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Carroll, John Millar. Computer security. 2nd ed. Boston: Butterworths, 1987.
Carroll, John Millar. Computer security. 3rd ed. Boston, Mass: Butterworth-Heinemann, 1996.
Gollmann, Dieter. Computer security. 2nd ed. Hoboken, NJ: Wiley, 2005.
Books, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1990.
Bulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.
Hollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Gollmann, Dieter. Computer security. Chichester: Wiley, 1999.
Library of Congress. Major Issues System, ed. Computer security issues: The Computer Security Act of 1987. [Washington, D.C.]: Library of Congress, Congressional Research Service, Major Issues System, 1987.
Tiley, W. Edward. Personal computer security. Foster City, CA: IDG Books Worldwide, 1996.
CA. Simple Computer Security. New York: John Wiley & Sons, Ltd., 2007.
Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Kotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.
Rak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.
Gorodetsky, Vladimir, Igor Kotenko, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.
Gorodetsky, Vladimir, Igor Kotenko, and Victor A. Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9.
Wang, Jie. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-79698-5.
Kotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8.
Bosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118820650.
Kizza, Joseph Migga. Computer Network Security. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b106962.
Gorodetsky, Vladimir, Leonard Popyack, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b12005.
Bosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118851678.
Forcht, Karen Anne. Computer security management. Danvers, Mass: Boyd & Fraser, 1994.
Hruska, Jan. Computer security solutions. Boca Raton: CRC Press, 1990.
Russell, Deborah. Computer security basics. Sebastopol, Calif: O'Reilly, 1991.
E, Hutt Arthur, Bosworth Seymour, and Hoyt Douglas B, eds. Computer security handbook. 3rd ed. New York: Wiley, 1995.
Boyle, Randall J. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.
Watt, Steve. Computer security manager. Oxford, Eng: Elsevier Advanced Technology in association with Alkemi Ltd, 1989.
E, Hutt Arthur, Bosworth Seymour, and Hoyt Douglas B, eds. Computer security handbook. 2nd ed. New York, N.Y: Macmillan Pub. Co., 1988.
Seymour, Bosworth, Kabay Michel E, and Whyne Eric 1981-, eds. Computer security handbook. 5th ed. Hoboken, N.J: John Wiley & Sons, 2009.
Lehtinen, Rick. Computer Security Basics. 2nd ed. Sebastopol, CA: O'Reilly & Associates, 2006.
Easttom, Chuck. Computer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.
Konheim, Alan G. Computer security & cryptography. New Jersey: John Wiley & Sons, 2007.
Russell, Deborah. Computer Security Basics. Cambridge, MA: O'Reilly & Associates, 1992.
Baker, Richard H. Computer security handbook. 2nd ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.
Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Easttom, Chuck. Computer security fundamentals. Upper Saddle River, N.J: Pearson Prentice Hall, 2006.
Russell, Deborah. Computer security basics. Sebastopol, CA: O'Reilly & Associates, 1991.
BOOKS, Editors of TIME-LIFE. Computer Security (Understanding Computers). Time Life UK, 1987.