Computers under attack intruders, worms, and viruses
| Main Author: | Denning, Peter J. 1942- (Author) |
|---|---|
| Format: | Book |
| Published: |
Reading, Mass.
Addison-Wesley
c1990
|
| Subjects: |
Similar Items
The computer virus crisis
by: Fites, Philip E., et al.
Published: (1992)
by: Fites, Philip E., et al.
Published: (1992)
Computer viruses
by: Summers, Wayne, et al.
Published: (1993)
by: Summers, Wayne, et al.
Published: (1993)
The computer virus handbook
by: Levin, Richard B.
Published: (1990)
by: Levin, Richard B.
Published: (1990)
Computer security
Published: (1986)
Published: (1986)
The computer virus protection handbook
by: Haynes, Colin
Published: (1990)
by: Haynes, Colin
Published: (1990)
A short course on computer viruses
by: Cohen, Frederick B. 1956-
Published: (1994)
by: Cohen, Frederick B. 1956-
Published: (1994)
Rogue programs virusus, worms, and Trojan horses
by: Hoffman, Lance J.
Published: (1990)
by: Hoffman, Lance J.
Published: (1990)
Computer viruses and data protection
Published: (1991)
Published: (1991)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Principles of plant virology genome, pathogenicity, virus ecology
by: Astier, S.
Published: (2007)
by: Astier, S.
Published: (2007)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Understanding viruses
by: Shors, Teri
Published: (2009)
by: Shors, Teri
Published: (2009)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Principles of plant virology
by: Astier, S.
Published: (2007)
by: Astier, S.
Published: (2007)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Viruses and apoptosis
by: Alonso, Covadonga 1960-
Published: (2008)
by: Alonso, Covadonga 1960-
Published: (2008)
Access control and identity management
by: Chapple, Mike
Published: (2021)
by: Chapple, Mike
Published: (2021)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
Viruses essential agents of life
by: Witzany, Gunther
Published: (2012)
by: Witzany, Gunther
Published: (2012)
Mengenal pasti virus tumbuh-tumbuhan
by: Noordam, D. (Dick)
Published: (1992)
by: Noordam, D. (Dick)
Published: (1992)
Bacteria and viruses
by: Rogers, Kara
Published: (2011)
by: Rogers, Kara
Published: (2011)
Api authorization by integrating role-based access control in kubernetes
by: Mohd Asyraf Muizzuddin Yunos
by: Mohd Asyraf Muizzuddin Yunos
Virus-insect-plant interactions /
Published: (2001)
Published: (2001)
Malware forensics investigating and analyzing malicious code
by: Aquilina, James M., et al.
Published: (2008)
by: Aquilina, James M., et al.
Published: (2008)
Introduction to modern virology
by: Dimmock, N. J, et al.
Published: (2016)
by: Dimmock, N. J, et al.
Published: (2016)
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
Designing an IAM framework with Oracle identity and access management suite
by: Scheidel, Jeff
Published: (2010)
by: Scheidel, Jeff
Published: (2010)
Molecular virology of human pathogenic viruses
by: Ryu, Wang-Shick
Published: (2017)
by: Ryu, Wang-Shick
Published: (2017)
Database design, development and deployment using Microsoft Access
by: Rob, Peter, et al.
Published: (2000)
by: Rob, Peter, et al.
Published: (2000)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Access 2000 client/server solutions
by: Klander, Lars
Published: (2000)
by: Klander, Lars
Published: (2000)
Access 97 developer's handbook
by: Litwin, Paul, et al.
Published: (1997)
by: Litwin, Paul, et al.
Published: (1997)
Similar Items
-
The computer virus crisis
by: Fites, Philip E., et al.
Published: (1992) -
Computer viruses
by: Summers, Wayne, et al.
Published: (1993) -
The computer virus handbook
by: Levin, Richard B.
Published: (1990) -
Computer security
Published: (1986) -
The computer virus protection handbook
by: Haynes, Colin
Published: (1990)