Computer viruses and data protection
| Corporate Author: | Burger, Ralf |
|---|---|
| Format: | Book |
| Published: |
Grand Rapids, Mich.
Abacus
1991.
|
| Subjects: |
Similar Items
The computer virus protection handbook
by: Haynes, Colin
Published: (1990)
by: Haynes, Colin
Published: (1990)
Computer viruses
by: Summers, Wayne, et al.
Published: (1993)
by: Summers, Wayne, et al.
Published: (1993)
The computer virus crisis
by: Fites, Philip E., et al.
Published: (1992)
by: Fites, Philip E., et al.
Published: (1992)
The computer virus handbook
by: Levin, Richard B.
Published: (1990)
by: Levin, Richard B.
Published: (1990)
A short course on computer viruses
by: Cohen, Frederick B. 1956-
Published: (1994)
by: Cohen, Frederick B. 1956-
Published: (1994)
Understanding viruses
by: Shors, Teri
Published: (2009)
by: Shors, Teri
Published: (2009)
Viruses essential agents of life
by: Witzany, Gunther
Published: (2012)
by: Witzany, Gunther
Published: (2012)
Viruses and apoptosis
by: Alonso, Covadonga 1960-
Published: (2008)
by: Alonso, Covadonga 1960-
Published: (2008)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
Bacteria and viruses
by: Rogers, Kara
Published: (2011)
by: Rogers, Kara
Published: (2011)
Virus-insect-plant interactions /
Published: (2001)
Published: (2001)
Mengenal pasti virus tumbuh-tumbuhan
by: Noordam, D. (Dick)
Published: (1992)
by: Noordam, D. (Dick)
Published: (1992)
Data protection strategy implementing data protection compliance
by: Morgan, Richard, et al.
Published: (2003)
by: Morgan, Richard, et al.
Published: (2003)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013)
by: Raggo, Micheal, et al.
Published: (2013)
Data protection law in Asia
by: Abu Bakar Munir, et al.
Published: (2018)
by: Abu Bakar Munir, et al.
Published: (2018)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Rogue programs virusus, worms, and Trojan horses
by: Hoffman, Lance J.
Published: (1990)
by: Hoffman, Lance J.
Published: (1990)
Digital copyright protection
by: Wayner, Peter 1964-
Published: (1997)
by: Wayner, Peter 1964-
Published: (1997)
Molecular virology of human pathogenic viruses
by: Ryu, Wang-Shick
Published: (2017)
by: Ryu, Wang-Shick
Published: (2017)
Analyzing computer security a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
Beyond Data Protection strategic Case Studies and Practical Guidance
by: Noriswadi Ismail, et al.
Published: (2013)
by: Noriswadi Ismail, et al.
Published: (2013)
Security in computing
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
Computer forensics and privacy
by: Caloyannnides, Michael A.
Published: (2001)
by: Caloyannnides, Michael A.
Published: (2001)
A practical guide to personal data protection
by: Adlin Abdul Majid
Published: (2023)
by: Adlin Abdul Majid
Published: (2023)
Principles of plant virology genome, pathogenicity, virus ecology
by: Astier, S.
Published: (2007)
by: Astier, S.
Published: (2007)
Data protection law and practice
by: Jay, Rosemary, et al.
Published: (2003)
by: Jay, Rosemary, et al.
Published: (2003)
Newcastle disease virus a journey from poultry to cancer
by: Khatijah Mohd. Yusoff
Published: (2008)
by: Khatijah Mohd. Yusoff
Published: (2008)
Data protection law and practice
by: Jay, Rosemary
Published: (2007)
by: Jay, Rosemary
Published: (2007)
Testing methods for seed-transmitted viruses principles and protocols
by: Albrechtsen, S. E (Sven Erik)
Published: (2006)
by: Albrechtsen, S. E (Sven Erik)
Published: (2006)
Practical information security management a completeguide to planning and implementation
by: Campbell, Tony
by: Campbell, Tony
Information security management concepts and practice
by: Raggad, Bel G.
Published: (2010)
by: Raggad, Bel G.
Published: (2010)
Oracle data guard 11g handbook
by: Carpenter, Larry
Published: (2009)
by: Carpenter, Larry
Published: (2009)
Computers and data processing
by: Deitel, Harvey M. 1945-, et al.
Published: (1982)
by: Deitel, Harvey M. 1945-, et al.
Published: (1982)
Privacy and data protection : a comparative analysis with special reference to the Malaysian proposed law
by: Abu Bakar Munir, et al.
Published: (2002)
by: Abu Bakar Munir, et al.
Published: (2002)
Information sharing and data protection in the area of freedom, security and justice towards harmonised data protection principles for information exchange at EU-level
by: Boehm, Franziska
Published: (2012)
by: Boehm, Franziska
Published: (2012)
Personal data & privacy protection
by: Abdul Raman Saad
Published: (2005)
by: Abdul Raman Saad
Published: (2005)
Introduction to modern virology
by: Dimmock, N. J, et al.
Published: (2016)
by: Dimmock, N. J, et al.
Published: (2016)
Introduction to computers and data processing
by: Shelly, Gary B., et al.
Published: (1980)
by: Shelly, Gary B., et al.
Published: (1980)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Similar Items
-
The computer virus protection handbook
by: Haynes, Colin
Published: (1990) -
Computer viruses
by: Summers, Wayne, et al.
Published: (1993) -
The computer virus crisis
by: Fites, Philip E., et al.
Published: (1992) -
The computer virus handbook
by: Levin, Richard B.
Published: (1990) -
A short course on computer viruses
by: Cohen, Frederick B. 1956-
Published: (1994)