Artículos de revistas sobre el tema "Computer security"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Computer security.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Computer security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Nissenbaum, Helen. "Where Computer Security Meets National Security1". Ethics and Information Technology 7, n.º 2 (junio de 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Schmalz, Edward A. "Computer Security". Californian Journal of Health Promotion 3, n.º 3 (1 de septiembre de 2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.

Texto completo
Resumen
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home. This article is a brief overview of some of the precautions that should be taken on a daily basis to protect your computer systems, files, data, and other pertinent information.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Alkandary, Yaquob H. A. y Eng Fawzyeya M. A. Alhallaq. "Computer Security". IJARCCE 5, n.º 1 (30 de enero de 2016): 1–6. http://dx.doi.org/10.17148/ijarcce.2016.5101.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

White, Richard. "Computer Security". Urologic Clinics of North America 13, n.º 1 (febrero de 1986): 119–28. http://dx.doi.org/10.1016/s0094-0143(21)01535-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Lincoln, Alan Jay. "Computer Security". Library & Archival Security 11, n.º 1 (26 de agosto de 1991): 157–71. http://dx.doi.org/10.1300/j114v11n01_11.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Mercuri, Rebecca T. "Computer security". Communications of the ACM 45, n.º 10 (octubre de 2002): 11–14. http://dx.doi.org/10.1145/570907.570917.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Dwan, Berni. "Computer security". Computer Fraud & Security 1999, n.º 10 (octubre de 1999): 19. http://dx.doi.org/10.1016/s1361-3723(00)88219-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Landwehr, Carl E. "Computer security". International Journal of Information Security 1, n.º 1 (agosto de 2001): 3–13. http://dx.doi.org/10.1007/s102070100003.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Hinde, Stephen. "Computer security". Computers & Security 22, n.º 8 (diciembre de 2003): 664–69. http://dx.doi.org/10.1016/s0167-4048(03)00003-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Andrews, M. y J. A. Whittaker. "Computer security". IEEE Security & Privacy Magazine 2, n.º 5 (septiembre de 2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Henniker-Heaton, Yvo. "Computer security". Computer Law & Security Review 3, n.º 3 (septiembre de 1987): 12–13. http://dx.doi.org/10.1016/0267-3649(87)90020-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Middleton, R. A. J. "Computer security". Computer Law & Security Review 3, n.º 2 (julio de 1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Brimicombe, Michael. "Computer security". Electronics Education 1996, n.º 2 (1996): 19–23. http://dx.doi.org/10.1049/ee.1996.0041.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Saxby, S. "Computer security". Computer Law & Security Review 22, n.º 4 (enero de 2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Gollmann, Dieter. "Computer security". Wiley Interdisciplinary Reviews: Computational Statistics 2, n.º 5 (15 de julio de 2010): 544–54. http://dx.doi.org/10.1002/wics.106.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Stosic, Lazar y Dragan Velickovic. "Computer security and security technologies". Journal of Process Management. New Technologies 1, n.º 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Hewitt, Barbara y Garry White. "Factors Influencing Security Incidents on Personal Computing Devices". Journal of Organizational and End User Computing 33, n.º 4 (julio de 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Texto completo
Resumen
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Ming, Xiaobo, Ying Chen y Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy". MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Texto completo
Resumen
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Trcek, D. "Security Metrics Foundations for Computer Security". Computer Journal 53, n.º 7 (3 de noviembre de 2009): 1106–12. http://dx.doi.org/10.1093/comjnl/bxp094.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Mcdowall, R. D. "Computer (in)security?1: logical security". Quality Assurance Journal 4, n.º 4 (2000): 197–205. http://dx.doi.org/10.1002/1099-1786(200012)4:4<197::aid-qaj114>3.0.co;2-b.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Markelova, E. B. y G. V. Popkov. "Home Computer Security". Interexpo GEO-Siberia 6 (18 de mayo de 2022): 170–78. http://dx.doi.org/10.33764/2618-981x-2022-6-170-178.

Texto completo
Resumen
Our life is firmly connected with information technologies: messengers, social networks, online stores - we use all these means of communication and communication on a daily basis. That is why information security plays an important role. Taking into account the rapid development of information technologies, it is becoming increasingly difficult to protect information, which is why the need to protect a computer from unauthorized access, theft of confidential information, exposure to malware is a priority in the field of computer technology and information security. This article presents the main threats to the security of a home computer, presents the results of a comparative analysis of ways to protect a home computer from virus, spyware, hacker, advertising and spam attacks, as well as from unauthorized access to information stored on a personal computer.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Carlson, David. "Teaching computer security". ACM SIGCSE Bulletin 36, n.º 2 (junio de 2004): 64–67. http://dx.doi.org/10.1145/1024338.1024374.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

No Author. "Computer security news". ACM SIGSAC Review 6, n.º 2 (julio de 1988): 4–5. http://dx.doi.org/10.1145/62175.62177.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

W, L. "Commonsense Computer Security". Journal of Information Technology 4, n.º 3 (septiembre de 1989): 171–72. http://dx.doi.org/10.1057/jit.1989.26.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Churchill, Elizabeth, Les Nelson y Diana K. Smetters. "Useful Computer Security". IEEE Internet Computing 12, n.º 3 (mayo de 2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Gengler, Barbara. "Computer security portals". Computer Fraud & Security 1999, n.º 2 (febrero de 1999): 6–7. http://dx.doi.org/10.1016/s1361-3723(99)80002-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Wilding, Edward. "Commonsense computer security". Computer Fraud & Security Bulletin 1990, n.º 7 (julio de 1990): 17–18. http://dx.doi.org/10.1016/0142-0496(90)90013-b.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Williams, Paul. "Auditing Computer Security". Computer Fraud & Security Bulletin 1990, n.º 5 (mayo de 1990): 19. http://dx.doi.org/10.1016/0142-0496(90)90057-r.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Timms, Mike. "Integrated computer security". Computer Fraud & Security Bulletin 1990, n.º 6 (junio de 1990): 9–14. http://dx.doi.org/10.1016/0142-0496(90)90150-j.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Smith, M. R. "Commonsense computer security". Computer Fraud & Security Bulletin 1991, n.º 3 (marzo de 1991): 7–15. http://dx.doi.org/10.1016/0142-0496(91)90062-a.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Wood, Charles Cresson. "Commonsense computer security". Computer Fraud & Security Bulletin 1994, n.º 9 (septiembre de 1994): 17–18. http://dx.doi.org/10.1016/0142-0496(94)90186-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Collinson, Helen. "Computer security surveys". Computer Fraud & Security Bulletin 1995, n.º 4 (abril de 1995): 8–10. http://dx.doi.org/10.1016/0142-0496(95)80148-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Tomayko, J. "Anecdotes [computer security]". IEEE Annals of the History of Computing 23, n.º 2 (abril de 2001): 78–79. http://dx.doi.org/10.1109/85.929916.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Caruso, Ronald D. "Personal Computer Security". RadioGraphics 23, n.º 5 (septiembre de 2003): 1329–37. http://dx.doi.org/10.1148/rg.235035021.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Salton, Gerald. "Computer-security technology". Information Processing & Management 22, n.º 3 (enero de 1986): 269–70. http://dx.doi.org/10.1016/0306-4573(86)90059-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Kuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)". Works of Georgian Technical University, n.º 2(524) (6 de junio de 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.

Texto completo
Resumen
The terms “kiberushishroeba” (cyber security) and “kiberusaprtkhoeba” (computer security) are often used in inappropriate contexts. The term “kiberushishroeba” is used when the avoidance of an imminent threat requires the formulation and implementation of socio-political measures (development and adoption of doctrines, laws, legal acts, improvement of the “kiberushishroeba” and “kiberusaprtkhoeba” assurance management process), because the state of protection of national interests in cyberspace is achieved through the establishment of an effective Computer Security system, cyberspace sustainability, protection from unwanted internal and external influences – as a result of qualified cyber policy. The starting-point in “kiberushishroeba” providing is political aim and the result – to achieve them. “Kiberusaprtkhoeba” is an integral component of “kiberushishroeba”, a carrier of different content and weight. “Kiberusaprtkhoeba” is a combination of technologies, methods and processes of technical protection against cyberattacks of components (networks, computers, programs, data, devices) within the field of computer and information-telecommunication. It is more associated with protection from "technical" threats (to be taken organizational-technical measures: to identify those responsible for the operation safety of the computerinformation-telecommunication field and to introduce appropriate technical infrastructure and security system) or rather to “protection of labor safety” than formulation and implementation of socio-political goals. The goal of “kiberusaprtkhoeba” is to protect them, and to achieve this protection as a whole is ensuring of the result that meets the requirements of the political goal of “kiberushishroeba”.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Klevtsov, O., A. Symonov y S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment". Nuclear and Radiation Safety, n.º 4(88) (11 de diciembre de 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Texto completo
Resumen
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Ahmadian Ramaki, Ali. "Language-Based Security to Apply Computer Security". International Journal on Cryptography and Information Security 2, n.º 3 (30 de septiembre de 2012): 37–47. http://dx.doi.org/10.5121/ijcis.2012.2303.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Kwiatkowski, Feliks y Alistair Kelman. "Computer security: Readings from security management magazine". Computer Fraud & Security Bulletin 9, n.º 9 (julio de 1987): 13–14. http://dx.doi.org/10.1016/0142-0496(87)90104-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Coronado, Adolfo S. "Principles of Computer Security: CompTIA Security+™". Journal of Information Privacy and Security 9, n.º 1 (enero de 2013): 70–72. http://dx.doi.org/10.1080/15536548.2013.10845674.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

CERNOV, Ana-Maria. "Security in Computer Networks". International Journal of Information Security and Cybercrime 7, n.º 1 (29 de junio de 2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Texto completo
Resumen
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Bella, Giampaolo y Peter Y. A. Ryan. "Journal of Computer Security". Journal of Computer Security 17, n.º 3 (15 de abril de 2009): 237. http://dx.doi.org/10.3233/jcs-2009-0346.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Peterson, I. "Federal Computer Security Concerns". Science News 128, n.º 15 (12 de octubre de 1985): 230. http://dx.doi.org/10.2307/3969834.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Moore, G. "Security for Computer Networks". Electronics and Power 31, n.º 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Branstad, D. "Guest editorial - Computer security". IEEE Communications Magazine 23, n.º 7 (julio de 1985): 10–11. http://dx.doi.org/10.1109/mcom.1985.1092611.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Dhillon, Gurpreet. "Computer Security within Organizations". European Journal of Information Systems 3, n.º 3 (julio de 1994): 241–42. http://dx.doi.org/10.1057/ejis.1994.25.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Wong, Ken. "Effective Computer Security Management". EDPACS 14, n.º 1 (julio de 1986): 7–10. http://dx.doi.org/10.1080/07366988609452212.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Middleton, R. "Computer security: the evidence". Computer Bulletin 37, n.º 6 (1 de diciembre de 1995): 2–4. http://dx.doi.org/10.1093/combul/37.6.2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Guynes, Steve. "Security of computer software". ACM SIGSAC Review 3, n.º 2-4 (septiembre de 1985): 31–35. http://dx.doi.org/10.1145/1058406.1058410.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Cortesi, Agostino y Riccardo Focardi. "Computer languages and security". Computer Languages, Systems & Structures 28, n.º 1 (abril de 2002): 1–2. http://dx.doi.org/10.1016/s0096-0551(02)00005-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía