Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Dallas Public Library.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Dallas Public Library.
- Label
- Computer security
77 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- 19 deadly sins of software security : programming flaws and how to fix them
- Absolute beginner's guide to security, spam, spyware & viruses
- Advanced persistent threat : understanding the danger and how to protect your organization
- Anti-hacker tool kit
- Auditing and security : AS/400, NT, Unix, networks, and disaster recovery plans
- Careers in e-commerce security and encryption
- Ciberseguridad : protege tu identidad y tus datos
- Coding for digital security
- Computer forensics : incident response essentials
- Computer forensics jumpstart
- Computer security literacy : staying safe in a digital world
- Conquer the web : the ultimate cybersecurity guide
- Crypto : how the code rebels beat the government-saving privacy in the digital age
- Current security management & ethical issues of information technology
- Cyber attack
- Cyber self-defense : expert advice to avoid online predators, identity theft, and cyberbullying
- Cyber terrorism : a guide for facility managers
- CyberShock : surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption
- Cybersecurity
- Cybersecurity today and tomorrow : pay now or pay later
- Data and Goliath : the hidden battles to collect your data and control your world
- Defense against the black arts : how hackers do what they do and how to protect against it
- Digital forensics explained
- E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets
- Future Crimes : Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- Future crimes
- Future crimes : everything is connected, everyone is vulnerable and what we can do about it
- Group policy : fundamentals, security, and the managed desktop
- Hack attacks denied : a complete guide to network lockdown
- Hack attacks revealed : a complete reference with custom security hacking toolkit
- Hack attacks testing : how to conduct your own security audit
- Hackers' handbook 3.0
- Hacking exposed Cisco networks : Cisco security secrets & solutions
- Hacking exposed computer forensics : secrets & solutions
- Hacking for dummies
- Hacking the future : privacy, identity, and anonymity on the Web
- Hackish C++ : pranks & tricks
- How to stop e-mail spam, spyware, malware, computer viruses, and hackers from ruining your computer or network : the complete guide for your home and work
- IT disaster recovery planning for dummies
- Incident response & computer forensics
- Incident response : investigating computer crime
- Information hiding techniques for steganography and digital watermarking
- Information security fundamentals
- Information warfare : chaos on the electronic superhighway
- Introduction to cryptography with Java applets
- Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code
- Mastering Web services security
- Mission-critical security planner : when hackers won't take no for an answer
- Network security : a beginner's guide
- Network security hacks
- Online privacy
- PC magazine fighting spyware, viruses, and malware
- Popular mechanics who's spying on you? : the looming threat to your privacy, identity, and family in the digital age
- Practical malware analysis : the hands-on guide to dissecting malicious software
- Privacy and big data
- Protect, clean up and speed up your computer for seniors : use the protection, clean up and optimization tools available in Windows
- Protecting your library's digital sources : the essential guide to planning and preservation
- Protecting your library's digital sources : the essential guide to planning and preservation
- Rise of the hackers
- Rootkits : subverting the Windows kernel
- Secret history : the story of cryptology
- Security technologies for the World Wide Web
- Security transformation : digital defense strategies to protect your company's reputation and market share
- Solving cyber risk : protecting your company and society
- Technology and privacy : the new landscape
- The art of deception : controlling the human element of security
- The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers
- The complete guide to Internet security
- The complete guide to physical security
- The complete idiot's guide to protecting yourself online
- The hacker's guide to OS X : exploiting OS X from the root up
- The international handbook of computer security
- The secure online business : e-commerce, IT functionality & business continuity
- The tangled Web : a guide to securing modern Web applications
- Unix Secure Shell Tools
- Wireless security : models, threats, and solutions
- Zero days
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.dallaslibrary.org/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.dallaslibrary.org/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.dallaslibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.dallaslibrary.org/">Dallas Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.dallaslibrary.org/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.dallaslibrary.org/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.dallaslibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.dallaslibrary.org/">Dallas Public Library</a></span></span></span></span></div>