Computers, ethics & social values
Main Authors: | Johnson, Deborah G. , 1945- (Author), Nissenbaum, Helen Fay (Author) |
---|---|
Format: | Book |
Published: |
Englewood Cliffs, NJ :
Prentice-Hall ,
c1995
|
Subjects: |
Similar Items
Computers, ethics and society
by: Ermann, M. David, et al.
Published: (2002)
by: Ermann, M. David, et al.
Published: (2002)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Computer insecurity : risking the system
by: Furnell, Steven
Published: (2005)
by: Furnell, Steven
Published: (2005)
Introduction to computer security
by: Bishop, Matt
Published: (2005)
by: Bishop, Matt
Published: (2005)
Computer and cyber security : principles, algorithm, applications, and perspectives
Principles of computer security : security+TM and beyond
by: Conklin, Wm. Arthur [ (William Arthur)]
Published: (2004)
by: Conklin, Wm. Arthur [ (William Arthur)]
Published: (2004)
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
CSA guide to cloud computing : implementing cloud privacy and security
by: Samani, Raj, et al.
Published: (2015)
by: Samani, Raj, et al.
Published: (2015)
Trust and security in collaborative computing
by: Zou, Xukai , 1963-, et al.
Published: (2008)
by: Zou, Xukai , 1963-, et al.
Published: (2008)
Computer forensics and cyber crime : an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Computer forensics jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
by: Nelson, Bill, et al.
Collaborative computer security and trust management [
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Cloud computing : The MIT press essential knowledge series
by: Ruparelia, Nayan B.
Published: (2016)
by: Ruparelia, Nayan B.
Published: (2016)
Gray hat hacking : the ethical hacker's handbook
by: Harper, Allen
Published: (2011)
by: Harper, Allen
Published: (2011)
Analyzing computer security : a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. , 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. , 1948-, et al.
Published: (2012)
Understanding security issues
by: Donaldson, Scott E., et al.
by: Donaldson, Scott E., et al.
Cloud computing and virtualization
Security 2020 : reduce security risks this decade
by: Howard, Doug, et al.
Published: (2011)
by: Howard, Doug, et al.
Published: (2011)
Cyberpunk : outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991)
by: Hafner, Katie, et al.
Published: (1991)
Computers in a changing society
by: Preston, John, et al.
Published: (2005)
by: Preston, John, et al.
Published: (2005)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Wireshark for security professionals : using wireshark and the metasploit framework
by: Bullock, Jessey, et al.
Published: (2017)
by: Bullock, Jessey, et al.
Published: (2017)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Principles of information systems security : text and cases
by: Dhillon, Gurpreet , 1963-
Published: (2007)
by: Dhillon, Gurpreet , 1963-
Published: (2007)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael , 1965-, et al.
Published: (2010)
by: Howard, Michael , 1965-, et al.
Published: (2010)
Information security : the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Introduction to security and network forensics
by: Buchanan, William J. , 1926-2005
Published: (2011)
by: Buchanan, William J. , 1926-2005
Published: (2011)
Security and resilience in intelligent data-centric systems and communication networks
Information security and IT risk management
by: Agrawal, Manish, et al.
by: Agrawal, Manish, et al.
Security in computing
by: Pfleeger, Charles P. , 1948-, et al.
Published: (2007)
by: Pfleeger, Charles P. , 1948-, et al.
Published: (2007)
Pengenalan kepada keselamatan komputer
by: Omar Zakaria, et al.
Published: (2002)
by: Omar Zakaria, et al.
Published: (2002)
Microsoft Windows security inside out
by: Bott, Ed, et al.
Published: (2003)
by: Bott, Ed, et al.
Published: (2003)
Microsoft Windows security resource kit
by: Smith, Ben, et al.
Published: (2003)
by: Smith, Ben, et al.
Published: (2003)
Protect your home PC : hackers, viruses and privancy
Published: (2002)
Published: (2002)
Advanced host intrusion prevention with CSA
by: Sullivan, Chad, et al.
Published: (2006)
by: Sullivan, Chad, et al.
Published: (2006)
Similar Items
-
Computers, ethics and society
by: Ermann, M. David, et al.
Published: (2002) -
Computer security fundamentals
by: Easttom, Chuck
Published: (2006) -
Computer security fundamentals
by: Easttom, Chuck
Published: (2012) -
Computer security fundamentals
by: Easttom, Chuck
Published: (2016) -
Computer insecurity : risking the system
by: Furnell, Steven
Published: (2005)