Explore: Computer Information Security

Discover books, insights, and more — all in one place.

Learn more about Computer Information Security with top reads curated from trusted sources — all in one place.

Topic Search

Search for any topic

AI-Generated Overview About “computer-information-security”:


Books Results

Source: The Open Library

The Open Library Search Results

Search results from The Open Library

1Essential System Administration

Pocket Reference

By

Book's cover

“Essential System Administration” Metadata:

  • Title: ➤  Essential System Administration
  • Author:
  • Languages: English - ger
  • Number of Pages: Median: 440
  • Publisher: ➤  O'Reilly - O'Reilly Media, Incorporated - O'Reilly Media, Inc. - O’Reilly & Associates - O’Reilly Media - O'Reilly & Associates
  • Publish Date: ➤  
  • Publish Location: ➤  Tokyo - Taipei - Sebastopol, CA - Cambridge - Sebastopol - Paris - Beijing - Farnham - Köln

“Essential System Administration” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 1991
  • Is Full Text Available: Yes
  • Is The Book Public: No
  • Access Status: Borrowable

Online Access

Downloads Are Not Available:

The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

Online Borrowing:

Online Marketplaces

Find Essential System Administration at online marketplaces:


2Principles of Information Systems Security

By

Book's cover

“Principles of Information Systems Security” Metadata:

  • Title: ➤  Principles of Information Systems Security
  • Author:
  • Language: English
  • Number of Pages: Median: 464
  • Publisher: Wiley
  • Publish Date:

“Principles of Information Systems Security” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2006
  • Is Full Text Available: Yes
  • Is The Book Public: No
  • Access Status: Printdisabled

Online Access

Downloads Are Not Available:

The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

Online Borrowing:

    Online Marketplaces

    Find Principles of Information Systems Security at online marketplaces:


    3KNOW IT security

    By

    Book's cover

    “KNOW IT security” Metadata:

    • Title: KNOW IT security
    • Author:
    • Language: English
    • Number of Pages: Median: 139
    • Publisher: Know Book Pub.
    • Publish Date:
    • Publish Location: Kensington, MD

    “KNOW IT security” Subjects and Themes:

    Edition Identifiers:

    Access and General Info:

    • First Year Published: 2004
    • Is Full Text Available: No
    • Is The Book Public: No
    • Access Status: No_ebook

    Online Marketplaces

    Find KNOW IT security at online marketplaces:


    4Intrusion detection

    By

    Book's cover

    “Intrusion detection” Metadata:

    • Title: Intrusion detection
    • Author:
    • Language: English
    • Number of Pages: Median: 348
    • Publisher: John Wiley
    • Publish Date:
    • Publish Location: New York

    “Intrusion detection” Subjects and Themes:

    Edition Identifiers:

    Access and General Info:

    • First Year Published: 1998
    • Is Full Text Available: Yes
    • Is The Book Public: No
    • Access Status: Printdisabled

    Online Access

    Downloads Are Not Available:

    The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

    Online Borrowing:

      Online Marketplaces

      Find Intrusion detection at online marketplaces:


      5The Internet worm

      By

      “The Internet worm” Metadata:

      • Title: The Internet worm
      • Author:
      • Language: English
      • Publisher: ➤  Research Institute for Advanced Computer Science, NASA Ames Research Center
      • Publish Date:
      • Publish Location: [Moffett Field, Calif.]

      “The Internet worm” Subjects and Themes:

      Edition Identifiers:

      Access and General Info:

      • First Year Published: 1989
      • Is Full Text Available: No
      • Is The Book Public: No
      • Access Status: No_ebook

      Online Access

      Downloads Are Not Available:

      The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

      Online Borrowing:

        Online Marketplaces

        Find The Internet worm at online marketplaces:


        6Vernetzte (Un-)Sicherheit?

        By

        Book's cover

        “Vernetzte (Un-)Sicherheit?” Metadata:

        • Title: Vernetzte (Un-)Sicherheit?
        • Author:
        • Language: ger
        • Number of Pages: Median: 281
        • Publisher: Kovač
        • Publish Date:
        • Publish Location: Hamburg, Germany

        “Vernetzte (Un-)Sicherheit?” Subjects and Themes:

        Edition Identifiers:

        Access and General Info:

        • First Year Published: 2014
        • Is Full Text Available: No
        • Is The Book Public: No
        • Access Status: No_ebook

        Online Access

        Downloads Are Not Available:

        The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

        Online Borrowing:

          Online Marketplaces

          Find Vernetzte (Un-)Sicherheit? at online marketplaces:


          7Computer security

          By

          Book's cover

          “Computer security” Metadata:

          • Title: Computer security
          • Author:
          • Language: English
          • Number of Pages: Median: 299
          • Publisher: Academic Press
          • Publish Date:
          • Publish Location: New York

          “Computer security” Subjects and Themes:

          Edition Identifiers:

          Access and General Info:

          • First Year Published: 1979
          • Is Full Text Available: Yes
          • Is The Book Public: No
          • Access Status: Printdisabled

          Online Access

          Downloads Are Not Available:

          The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

          Online Borrowing:

            Online Marketplaces

            Find Computer security at online marketplaces:


            8The Process of Network Security

            By

            Book's cover

            “The Process of Network Security” Metadata:

            • Title: ➤  The Process of Network Security
            • Author:
            • Language: English
            • Number of Pages: Median: 304
            • Publisher: Addison-Wesley Professional
            • Publish Date:

            “The Process of Network Security” Subjects and Themes:

            Edition Identifiers:

            Access and General Info:

            • First Year Published: 2000
            • Is Full Text Available: Yes
            • Is The Book Public: No
            • Access Status: Printdisabled

            Online Access

            Downloads Are Not Available:

            The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

            Online Borrowing:

              Online Marketplaces

              Find The Process of Network Security at online marketplaces:


              9Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO

              By

              “Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO” Metadata:

              • Title: ➤  Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO
              • Author:
              • Language: English
              • Publisher: ➤  Available from NASA Center for AeroSpace Information - National Aeronautics and Space Administration, Glenn Research Center
              • Publish Date:
              • Publish Location: Hanover MD - [Cleveland, Ohio]

              “Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO” Subjects and Themes:

              Edition Identifiers:

              Access and General Info:

              • First Year Published: 2002
              • Is Full Text Available: No
              • Is The Book Public: No
              • Access Status: No_ebook

              Online Access

              Downloads Are Not Available:

              The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

              Online Borrowing:

                Online Marketplaces

                Find Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO at online marketplaces:


                10Space lab system analysis

                By

                “Space lab system analysis” Metadata:

                • Title: Space lab system analysis
                • Author:
                • Language: English
                • Publisher: ➤  Dept. of Electrical and Computer Engineering, Mississippi State University - National Aeronautics and Space Administration
                • Publish Date:
                • Publish Location: ➤  Mississippi State, MS - [Washington, D.C

                “Space lab system analysis” Subjects and Themes:

                Edition Identifiers:

                Access and General Info:

                • First Year Published: 1990
                • Is Full Text Available: No
                • Is The Book Public: No
                • Access Status: No_ebook

                Online Access

                Downloads Are Not Available:

                The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

                Online Borrowing:

                  Online Marketplaces

                  Find Space lab system analysis at online marketplaces:


                  11COSPO/CENDI Industry Day Conference

                  By

                  “COSPO/CENDI Industry Day Conference” Metadata:

                  • Title: ➤  COSPO/CENDI Industry Day Conference
                  • Author: ➤  
                  • Language: English
                  • Publisher: ➤  National Aeronautics and Space Administration - National Technical Information Service, distributor
                  • Publish Date:
                  • Publish Location: ➤  [Washington, D.C - Springfield, Va

                  “COSPO/CENDI Industry Day Conference” Subjects and Themes:

                  Edition Identifiers:

                  Access and General Info:

                  • First Year Published: 1995
                  • Is Full Text Available: No
                  • Is The Book Public: No
                  • Access Status: No_ebook

                  Online Access

                  Downloads Are Not Available:

                  The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

                  Online Borrowing:

                    Online Marketplaces

                    Find COSPO/CENDI Industry Day Conference at online marketplaces:


                    126th ACM Conference on Computer and Communications Security

                    By

                    Book's cover

                    “6th ACM Conference on Computer and Communications Security” Metadata:

                    • Title: ➤  6th ACM Conference on Computer and Communications Security
                    • Author: ➤  
                    • Language: English
                    • Number of Pages: Median: 147
                    • Publisher: ➤  Association for Computing Machinery
                    • Publish Date:
                    • Publish Location: New York

                    “6th ACM Conference on Computer and Communications Security” Subjects and Themes:

                    Edition Identifiers:

                    Access and General Info:

                    • First Year Published: 1999
                    • Is Full Text Available: No
                    • Is The Book Public: No
                    • Access Status: No_ebook

                    Online Marketplaces

                    Find 6th ACM Conference on Computer and Communications Security at online marketplaces:


                    13Partitioning in avionics architectures

                    By

                    “Partitioning in avionics architectures” Metadata:

                    • Title: ➤  Partitioning in avionics architectures
                    • Author:
                    • Language: English
                    • Publisher: ➤  National Aeronautics and Space Administration, Langley Research Center - National Technical Information Service, distributor
                    • Publish Date:
                    • Publish Location: Hampton, Va - [Springfield, Va

                    “Partitioning in avionics architectures” Subjects and Themes:

                    Edition Identifiers:

                    Access and General Info:

                    • First Year Published: 1999
                    • Is Full Text Available: No
                    • Is The Book Public: No
                    • Access Status: No_ebook

                    Online Access

                    Downloads Are Not Available:

                    The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

                    Online Borrowing:

                      Online Marketplaces

                      Find Partitioning in avionics architectures at online marketplaces:


                      14A formal model of partitioning for integrated modular avionics

                      By

                      “A formal model of partitioning for integrated modular avionics” Metadata:

                      • Title: ➤  A formal model of partitioning for integrated modular avionics
                      • Author:
                      • Language: English
                      • Publisher: ➤  National Technical Information Service, distributor - National Aeronautics and Space Administration, Langley Research Center
                      • Publish Date:
                      • Publish Location: Hampton, Va - Springfield, VA

                      “A formal model of partitioning for integrated modular avionics” Subjects and Themes:

                      Edition Identifiers:

                      Access and General Info:

                      • First Year Published: 1998
                      • Is Full Text Available: No
                      • Is The Book Public: No
                      • Access Status: No_ebook

                      Online Access

                      Downloads Are Not Available:

                      The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

                      Online Borrowing:

                        Online Marketplaces

                        Find A formal model of partitioning for integrated modular avionics at online marketplaces:


                        15Theft of information in the take-grant protection model

                        By

                        “Theft of information in the take-grant protection model” Metadata:

                        • Title: ➤  Theft of information in the take-grant protection model
                        • Author:
                        • Language: English
                        • Publisher: ➤  National Aeronautics and Space Administration - National Technical Information Service, distributor
                        • Publish Date:
                        • Publish Location: ➤  Springfield, Va - [Washington, DC

                        “Theft of information in the take-grant protection model” Subjects and Themes:

                        Edition Identifiers:

                        Access and General Info:

                        • First Year Published: 1989
                        • Is Full Text Available: No
                        • Is The Book Public: No
                        • Access Status: No_ebook

                        Online Access

                        Downloads Are Not Available:

                        The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

                        Online Borrowing:

                          Online Marketplaces

                          Find Theft of information in the take-grant protection model at online marketplaces:


                          16Disaster Management in Telecommunications, Broadcasting and Computer Systems

                          By

                          Book's cover

                          “Disaster Management in Telecommunications, Broadcasting and Computer Systems” Metadata:

                          • Title: ➤  Disaster Management in Telecommunications, Broadcasting and Computer Systems
                          • Author:
                          • Language: English
                          • Number of Pages: Median: 482
                          • Publisher: Wiley
                          • Publish Date:

                          “Disaster Management in Telecommunications, Broadcasting and Computer Systems” Subjects and Themes:

                          Edition Identifiers:

                          First Setence:

                          "A problem is the cause of an undesired situation; it means that we cannot get the anticipated results from our activities at work."

                          Access and General Info:

                          • First Year Published: 2001
                          • Is Full Text Available: Yes
                          • Is The Book Public: No
                          • Access Status: Printdisabled

                          Online Access

                          Downloads Are Not Available:

                          The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

                          Online Borrowing:

                            Online Marketplaces

                            Find Disaster Management in Telecommunications, Broadcasting and Computer Systems at online marketplaces:


                            17New Security Paradigms Workshop

                            By

                            “New Security Paradigms Workshop” Metadata:

                            • Title: ➤  New Security Paradigms Workshop
                            • Author: ➤  
                            • Language: English
                            • Number of Pages: Median: 144
                            • Publisher: ➤  Association for Computing Machinery
                            • Publish Date:
                            • Publish Location: New York, N.Y

                            “New Security Paradigms Workshop” Subjects and Themes:

                            Edition Identifiers:

                            Access and General Info:

                            • First Year Published: 2002
                            • Is Full Text Available: No
                            • Is The Book Public: No
                            • Access Status: No_ebook

                            Online Marketplaces

                            Find New Security Paradigms Workshop at online marketplaces:


                            18Advances in Computers

                            Volume 37

                            By

                            Book's cover

                            “Advances in Computers” Metadata:

                            • Title: Advances in Computers
                            • Author:
                            • Language: English
                            • Number of Pages: Median: 377
                            • Publisher: ➤  Academic Pr - Academic Press Inc.,U.S. - Academic Press - Academic P.
                            • Publish Date: ➤  
                            • Publish Location: ➤  San Diego, California - Orlando, Fla - London

                            “Advances in Computers” Subjects and Themes:

                            Edition Identifiers:

                            First Setence:

                            "Program Understanding, also referred to as Code Cognition or Program Comprehension, is a central activity during software maintenance, evolution, and reuse."

                            Access and General Info:

                            • First Year Published: 1971
                            • Is Full Text Available: Yes
                            • Is The Book Public: Yes
                            • Access Status: Public

                            Online Access

                            Online Borrowing:

                            Online Marketplaces

                            Find Advances in Computers at online marketplaces:



                            Wiki

                            Source: Wikipedia

                            Wikipedia Results

                            Search Results from Wikipedia

                            Computer security

                            Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security

                            Information security audit

                            often then referred to as an information technology security audit or a computer security audit. However, information security encompasses much more than

                            Security hacker

                            A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system

                            Computer security software

                            Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context

                            Information security

                            Information security (infosec) is the practice of protecting information by mitigating information risks. It is part of information risk management. It

                            Security engineering

                            1967, "Security and Privacy in Computer Systems" by Willis H. Ware. This paper, later expanded in 1979, provided many of the fundamental information security

                            White hat (computer security)

                            someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There

                            Outline of computer security

                            topical guide to computer security: Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline

                            Computer emergency response team

                            A computer emergency response team (CERT) is an incident response team dedicated to computer security incidents. Other names used to describe CERT include

                            List of computer security companies

                            There are various companies that provide computer security services, develop computer security software or resell software exploits. ADF Solutions Altor