Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Internet Archive - Open Library.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Internet Archive - Open Library.
- Label
- Computer security
100+ Items that share the Concept Computer security
Context
Context of Computer securitySubject of
- .NET framework security
- A complete h@cker's handbook : everything you need to know about hacking in the age of the Web
- A complete h@cker's handbook : everything you need to know about hacking in the age of the Web
- Black hats : misfits, criminals, and scammers in the Internet age
- Building Linux and OpenBSD firewalls
- Check Point NG : next generation security administration
- Computer concepts
- Computer crime : a crimefighter's handbook
- Computer forensics : computer crime scene investigation
- Computer security
- Computer security
- Computer security : readings from Security management magazine
- Computer security basics
- Computer security sourcebook
- Computers at risk : safe computing in the information age
- Computers, ethics & social values
- Cryptography for Internet and database applications : developing secret and public key techniques with Java
- Cryptography, a primer
- Cybercrime : vandalising the information society
- Cyberpunk : outlaws and hackers on the computer frontier
- Cyberpunk : outlaws and hackers on the computer frontier
- Digital certificates : applied Internet security
- Digital defense : what you should know about protecting your company's assets
- E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets
- Ensuring a C2 level of trust and interoperability in a networked Windows NT environment
- Essential computer security : everyone's guide to e-mail, internet, and wireless security
- FISMA certification & accreditation handbook
- Fundamentals of computer security technology
- Hack proofing your network : internet tradecraft
- Hacker attack
- Hacker proof : the ultimate guide to network security
- Hacking RSS and Atom
- How to cheat at Windows System Administration using command line scripts
- Improving Web application security : threats and countermeasures
- Information security architecture : an integrated approach to security in the organization
- Inside Java 2 platform security : architecture, API design, and implementation
- Internet privacy for dummies
- Internet security professional reference
- Is it safe? : protecting your computer, your business, and yourself online
- Java network security
- Linux system security : an administrator's guide to open source security tools
- Living with the Internet and online dangers
- Lock the boogie-man out of your computer : the identity crisis guide to online safety
- MCSE exam 70-227 : Microsoft Internet security and acceleration server 2000 : training kit
- Mafiaboy : a portrait of the hacker as a young man
- Malicious mobile code : virus protection for Windows
- Managing CISCO network security : building rock-solid networks
- Maximum Linux security : a hacker's guide to protecting your Linux server and workstation
- Maximum security
- Maximum security : a hacker's guide to protecting your Internet site and network
- Maximum security : a hacker's guide to protecting your Internet site and network
- Mecklermedia's official Internet world Internet security handbook
- Microsoft Windows security resource kit
- Mission-critical security planner : when hackers won't take no for an answer
- Navegacion anonima y segura
- Netspionage : the global threat to information
- Network and Internet security
- Network intrusion detection : an analyst's handbook
- Network security : a hacker's perspective
- Network security : data and voice communications
- Network security : private communication in a public world
- No child is safe from Internet crime : a guide for parents
- Norton all-in-one desk reference for dummies
- Own your space : keep yourself and your stuff safe online
- PC confidential : secure your PC and privacy from snoops, spies, spouses, supervisors, and credit card thieves
- PC magazine Windows XP security solutions
- Practical UNIX and Internet security
- Protect your home PC : hackers, viruses, and privacy
- Protect yourself online
- Protecting networks with SATAN
- Protecting your PC
- Secrets and lies : digital security in a networked world
- Secrets of a super hacker
- Secure data networking
- Securing Java : getting down to business with mobile code
- Security engineering : a guide to building dependable distributed systems
- Security in computing
- Security power tools
- Simple computer security : disinfect your PC
- Snort for dummies
- Solaris security
- SuperKey : version 1.0 : owner's handbook
- System security : a management perspective
- Tangled web : tales of digital crime from the shadows of cyberspace
- Technology and privacy : the new landscape
- Teens and computers what's a parent to do? : a basic guide to social networking, instant messaging, chat, email,computer set-up, and more / Donna S. Bast
- The CERT guide to system and network security practices
- The SRI hierarchical development methodology (HDM) and its application to the development of secure software
- The Symantec guide to home internet security
- The complete idiot's guide to Internet privacy and security
- The complete idiot's guide to downloading
- The complete idiot's guide to protecting yourself online
- The hacker report
- The hundredth window : protecting your privacy and security in the age of the Internet
- The information systems security officer's guide : establishing and managing an information protection program
- The networking CD bookshelf
- The personal security handbook : practical tools for keeping yourself, your family & your things safe at work, home or on the road
- The rise of the computer state
- The senior's guide to the Internet : surfing, shopping, e-mail and security
- Top secret/trade secret : accessing and safeguarding restricted information
- UNIX security for the organization
- UNIX system security
- UNIX system security : how to protect your data and prevent intruders
- Visual Basic .NET code security handbook
- Voice and data security
- Windows 2000 security
- Windows 2000 security
- Windows 2000 server security for dummies
- Windows 95 and NT 4.0 registry & customization handbook
- Windows Server 2003 security : a technical reference
- Windows Vista security guide
- Writing secure code
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.archive.org/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.archive.org/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.archive.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.archive.org/">Internet Archive - Open Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.archive.org/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.archive.org/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.archive.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.archive.org/">Internet Archive - Open Library</a></span></span></span></span></div>