Books on the topic 'Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Pamela, Kane, ed. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.
Find full textW, Roberts D. Computer security. London: Blenheim Online Publications, 1990.
Find full textHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Find full textKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, and Christos Kalloniatis, eds. Computer Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Full textKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Full textFournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Full textLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Full textLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Full textBoureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Full textKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, and Stefanos Gritzalis, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Full textKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, and Steven Furnell, eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0.
Full textHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Find full textBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1986.
Find full textCarroll, John Millar. Computer security. 2nd ed. Boston: Butterworths, 1987.
Find full textBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1990.
Find full textBulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.
Find full textHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Find full text(Firm), Shotlist, Films for the Humanities (Firm), and BDP Media Solutions (Firm), eds. Computer security. Princeton, NJ: Films for the Humanities & Sciences, 2001.
Find full textCA. Simple Computer Security. New York: John Wiley & Sons, Ltd., 2007.
Find full textHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Find full textKotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.
Full textRak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.
Full textGorodetsky, Vladimir, Igor Kotenko, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.
Full textGorodetsky, Vladimir, Igor Kotenko, and Victor A. Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9.
Full textWang, Jie. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-79698-5.
Full textKotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8.
Full textBosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118820650.
Full textKizza, Joseph Migga. Computer Network Security. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b106962.
Full textGorodetsky, Vladimir, Leonard Popyack, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b12005.
Full textBosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118851678.
Full textForcht, Karen Anne. Computer security management. Danvers, Mass: Boyd & Fraser, 1994.
Find full textSeymour, Bosworth, Kabay Michel E, and Whyne Eric 1981-, eds. Computer security handbook. 5th ed. Hoboken, N.J: John Wiley & Sons, 2009.
Find full textDeborah, Russell, Gangemi G. T, and Russell Deborah, eds. Computer Security Basics. 2nd ed. Sebastopol, CA: O'Reilly & Associates, 2006.
Find full textM, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Find full textWilma, Caldwell, ed. Computer security sourcebook. Detroit, MI: Omnigraphics, 2003.
Find full textinc, International Resource Development, ed. Computer security markets. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1987.
Find full textSnekkenes, Einar. Computer Security: Proceedings. Berlin: Springer, 2003.
Find full textRussell, Deborah. Computer security basics. Sebastopol, Calif: O'Reilly, 1991.
Find full textE, Hutt Arthur, Bosworth Seymour, and Hoyt Douglas B, eds. Computer security handbook. 3rd ed. New York: Wiley, 1995.
Find full textWatt, Steve. Computer security manager. Oxford, Eng: Elsevier Advanced Technology in association with Alkemi Ltd, 1989.
Find full textRussell, Deborah. Computer Security Basics. Cambridge, MA: O'Reilly & Associates, 1992.
Find full textBaker, Richard H. Computer security handbook. 2nd ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.
Find full textHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Find full textBOOKS, Editors of TIME-LIFE. Computer Security (Understanding Computers). Time Life UK, 1987.
Find full textStallone. Computer Security. Oryson Press, 2023.
Find full textDu, Wenliang. Computer Security. 3rd ed. WORLD SCIENTIFIC, 2022. http://dx.doi.org/10.1142/13053.
Full textComputer Security. Elsevier, 1987. http://dx.doi.org/10.1016/c2013-0-01065-1.
Full textGollmann, Dieter. Computer Security. Wiley & Sons, Incorporated, John, 2007.
Find full textBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Find full textComputer Security. Butterworth-Heinemann, 1987.
Find full text