Explore: Computer Information Security
Discover books, insights, and more — all in one place.
Learn more about Computer Information Security with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computer-information-security”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Essential System Administration
Pocket Reference
By Æleen Frisch

“Essential System Administration” Metadata:
- Title: ➤ Essential System Administration
- Author: Æleen Frisch
- Languages: English - ger
- Number of Pages: Median: 440
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated - O'Reilly Media, Inc. - O’Reilly & Associates - O’Reilly Media - O'Reilly & Associates
- Publish Date: ➤ 1991 - 1992 - 1993 - 1995 - 2002 - 2003
- Publish Location: ➤ Tokyo - Taipei - Sebastopol, CA - Cambridge - Sebastopol - Paris - Beijing - Farnham - Köln
“Essential System Administration” Subjects and Themes:
- Subjects: ➤ Operating systems (Computers) - UNIX (Computer file) - Linux - Unix (computer operating system) - Linux (computer operating system) - Electronic data processing, management - COMPUTERS - System Administration - Linux & UNIX Administration - Systèmes d'exploitation - UNIX - Systeembeheer - Computer programs - Programming languages - Computer programming - Disk operating system (DOS) - File maintenance (computers) - Windows (computer programs) - Modems - Data processing terminals - Computer information security - UNIX (système d'exploitation des ordinateurs) - Réseaux d'ordinateurs - Systems analysis & design - General - Com046030 - Cs.cmp_sc.app_sw - Cs.cmp_sc.opert_systm - Qa76.76.o63 f78 1995 - Qa 76.76 .o63 f917e 1995 - 005.4/3
Edition Identifiers:
- The Open Library ID: ➤ OL1354304M - OL555689M - OL7580997M - OL17920124M - OL20897030M - OL21382552M - OL839098M - OL36804991M - OL36708470M - OL27911870M - OL3703851M
- Online Computer Library Center (OCLC) ID: 51217456 - 44964856 - 49249694
- Library of Congress Control Number (LCCN): 92245940 - 96138116 - 2002023321 - 95115472 - 2003271494
- All ISBNs: ➤ 0937175803 - 0596550499 - 0596516932 - 9780596516932 - 9780596550493 - 0596004494 - 9780596004491 - 0596003439 - 9780937175804 - 3897212501 - 9780596003432 - 9783897212503 - 0937175749 - 9781565921276 - 9780937175743 - 1565921275
Author's Alternative Names:
"AEleen Frisch"Access and General Info:
- First Year Published: 1991
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Essential System Administration at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Principles of Information Systems Security
By Gurpreet Dhillon

“Principles of Information Systems Security” Metadata:
- Title: ➤ Principles of Information Systems Security
- Author: Gurpreet Dhillon
- Language: English
- Number of Pages: Median: 464
- Publisher: Wiley
- Publish Date: 2006
“Principles of Information Systems Security” Subjects and Themes:
- Subjects: ➤ COMPUTER VIRUSES - COMPUTER PROGRAM INTEGRITY - Securite informatique - Securite - COMPUTER NETWORKS - COMPUTERS - COMPUTER INFORMATION SECURITY - Systemes informatiques - Reseaux d'ordinateurs - OPERATING SYSTEMS (COMPUTERS) - Computer networks - Edudes de Cas - Computer security - Mesures - Security measures - Etudes de Cas - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL7617462M
- Online Computer Library Center (OCLC) ID: 63171245
- Library of Congress Control Number (LCCN): 2006041705
- All ISBNs: 9780471450566 - 0471450561
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Principles of Information Systems Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3KNOW IT security
By James P. Litchko

“KNOW IT security” Metadata:
- Title: KNOW IT security
- Author: James P. Litchko
- Language: English
- Number of Pages: Median: 139
- Publisher: Know Book Pub.
- Publish Date: 2004
- Publish Location: Kensington, MD
“KNOW IT security” Subjects and Themes:
- Subjects: ➤ Access control - Computer information security - Computer networks - Computer program integrity - Computer security - Computers - Security measures - COMPUTER INFORMATION SECURITY - COMPUTER NETWORKS - COMPUTER PROGRAM INTEGRITY
Edition Identifiers:
- The Open Library ID: OL3315656M
- Online Computer Library Center (OCLC) ID: 57135029
- Library of Congress Control Number (LCCN): 2004110405
- All ISBNs: 0974884502 - 9780974884509
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find KNOW IT security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Intrusion detection
By Terry Escamilla

“Intrusion detection” Metadata:
- Title: Intrusion detection
- Author: Terry Escamilla
- Language: English
- Number of Pages: Median: 348
- Publisher: John Wiley
- Publish Date: 1998
- Publish Location: New York
“Intrusion detection” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer security - Mesures - Securite - Securite informatique - COMPUTER INFORMATION SECURITY - COMPUTER NETWORKS - Reseaux d'ordinateurs - SECURITY
Edition Identifiers:
- The Open Library ID: OL372083M
- Library of Congress Control Number (LCCN): 98033703
- All ISBNs: 9780471290001 - 0471290009
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Intrusion detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5The Internet worm
By Peter J. Denning
“The Internet worm” Metadata:
- Title: The Internet worm
- Author: Peter J. Denning
- Language: English
- Publisher: ➤ Research Institute for Advanced Computer Science, NASA Ames Research Center
- Publish Date: 1989
- Publish Location: [Moffett Field, Calif.]
“The Internet worm” Subjects and Themes:
- Subjects: ➤ Protection - Computer information security - Internets - ARPA computer network - Vulnerability - Computer programs - Disrupting
Edition Identifiers:
- The Open Library ID: OL16137851M - OL17631946M
- Online Computer Library Center (OCLC) ID: 66284562
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Internet worm at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Vernetzte (Un-)Sicherheit?
By Jakob Kullik

“Vernetzte (Un-)Sicherheit?” Metadata:
- Title: Vernetzte (Un-)Sicherheit?
- Author: Jakob Kullik
- Language: ger
- Number of Pages: Median: 281
- Publisher: Kovač
- Publish Date: 2014
- Publish Location: Hamburg, Germany
“Vernetzte (Un-)Sicherheit?” Subjects and Themes:
- Subjects: Cyberspace - Cyberwar - Computer information security - Cyber Security
- Places: Germany - European Union
Edition Identifiers:
- The Open Library ID: OL25645548M
- Online Computer Library Center (OCLC) ID: 871180853
- All ISBNs: 3830076495 - 9783830076490
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Vernetzte (Un-)Sicherheit? at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Computer security
By David K. Hsiao

“Computer security” Metadata:
- Title: Computer security
- Author: David K. Hsiao
- Language: English
- Number of Pages: Median: 299
- Publisher: Academic Press
- Publish Date: 1979
- Publish Location: New York
“Computer security” Subjects and Themes:
- Subjects: ➤ Computer security - Electronic data processing departments - Security measures - Surete - Computerbeveiliging - Computersicherheit - COMPUTER INFORMATION SECURITY - Sicherheitskontrolle - Controle - Centres de traitement de l'information - INFORMATION RETRIEVAL - Datenverarbeitung - DATA SYSTEMS - Acces - Mesures - Ordinateurs - MULTIPLE ACCESS - DATA STORAGE - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL4410994M
- Online Computer Library Center (OCLC) ID: 4883723
- Library of Congress Control Number (LCCN): 79014503
- All ISBNs: 0123576504 - 9780123576507
Access and General Info:
- First Year Published: 1979
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8The Process of Network Security
By Thomas A. Wadlow

“The Process of Network Security” Metadata:
- Title: ➤ The Process of Network Security
- Author: Thomas A. Wadlow
- Language: English
- Number of Pages: Median: 304
- Publisher: Addison-Wesley Professional
- Publish Date: 2000
“The Process of Network Security” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer networks - Security measures - Datensicherung - Rechnernetz - COMPUTER NETWORKS - COMPUTER INFORMATION SECURITY - NETWORK CONTROL - ACCESS CONTROL
Edition Identifiers:
- The Open Library ID: OL7407467M
- Library of Congress Control Number (LCCN): 99058362
- All ISBNs: 9780201433173 - 0201433176
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Process of Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9New Security Paradigms Workshop
By ACM SIGSAC New Security Paradigms Workshop (2002 Virginia Beach, Va.)
“New Security Paradigms Workshop” Metadata:
- Title: ➤ New Security Paradigms Workshop
- Author: ➤ ACM SIGSAC New Security Paradigms Workshop (2002 Virginia Beach, Va.)
- Language: English
- Number of Pages: Median: 144
- Publisher: ➤ Association for Computing Machinery
- Publish Date: 2002
- Publish Location: New York, N.Y
“New Security Paradigms Workshop” Subjects and Themes:
- Subjects: ➤ Computer information security - Computer networks - Computer program integrity - Computer security - Computer viruses - Computers - Congresses - Operating systems (Computers) - Security measures - Computer networks, congresses - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL3704853M
- Online Computer Library Center (OCLC) ID: 52290717
- Library of Congress Control Number (LCCN): 2003273199
- All ISBNs: 158113598X - 9781581135985
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find New Security Paradigms Workshop at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO
By Robert I. Griffin
“Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO” Metadata:
- Title: ➤ Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO
- Author: Robert I. Griffin
- Language: English
- Publisher: ➤ Available from NASA Center for AeroSpace Information - National Aeronautics and Space Administration, Glenn Research Center
- Publish Date: 2002
- Publish Location: Hanover MD - [Cleveland, Ohio]
“Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO” Subjects and Themes:
- Subjects: ➤ Architecture (Computers) - Computer information security - Internets - Computer networks - Operating systems (Computers) - Computer systems design - Protocol (Computers)
Edition Identifiers:
- The Open Library ID: OL16055641M
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Space lab system analysis
By Frank M. Ingels
“Space lab system analysis” Metadata:
- Title: Space lab system analysis
- Author: Frank M. Ingels
- Language: English
- Publisher: ➤ Dept. of Electrical and Computer Engineering, Mississippi State University - National Aeronautics and Space Administration
- Publish Date: 1990
- Publish Location: ➤ Mississippi State, MS - [Washington, D.C
“Space lab system analysis” Subjects and Themes:
- Subjects: Computer viruses - Systems analysis - Computer information security - Solid propellant rocket engines
Edition Identifiers:
- The Open Library ID: OL16133017M
Access and General Info:
- First Year Published: 1990
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Space lab system analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12COSPO/CENDI Industry Day Conference
By COSPO/CENDI Industry Day Conference (1995 Alexandria, Va.)
“COSPO/CENDI Industry Day Conference” Metadata:
- Title: ➤ COSPO/CENDI Industry Day Conference
- Author: ➤ COSPO/CENDI Industry Day Conference (1995 Alexandria, Va.)
- Language: English
- Publisher: ➤ National Aeronautics and Space Administration - National Technical Information Service, distributor
- Publish Date: 1995
- Publish Location: ➤ [Washington, D.C - Springfield, Va
“COSPO/CENDI Industry Day Conference” Subjects and Themes:
- Subjects: ➤ Computer information security - Conferences - Data bases - Databases - Electronic publishing - Indexes (Documentation) - Information Systems - Information management - Information retrieval - Machine translation - Natural language processing - Protocol (Computers)
Edition Identifiers:
- The Open Library ID: OL15421573M
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find COSPO/CENDI Industry Day Conference at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
136th ACM Conference on Computer and Communications Security
By ACM Conference on Computer and Communications Security (6th 1999 Singapore)

“6th ACM Conference on Computer and Communications Security” Metadata:
- Title: ➤ 6th ACM Conference on Computer and Communications Security
- Author: ➤ ACM Conference on Computer and Communications Security (6th 1999 Singapore)
- Language: English
- Number of Pages: Median: 147
- Publisher: ➤ Association for Computing Machinery
- Publish Date: 1999
- Publish Location: New York
“6th ACM Conference on Computer and Communications Security” Subjects and Themes:
- Subjects: ➤ Congresses - Computer security - Data transmission systems - Security measures - Telecommunication systems - COMPUTER INFORMATION SECURITY - DATA TRANSMISSION - CONFERENCES
Edition Identifiers:
- The Open Library ID: OL15469067M
- Online Computer Library Center (OCLC) ID: 42996069
- All ISBNs: 1581131488 - 9781581131482
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find 6th ACM Conference on Computer and Communications Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Partitioning in avionics architectures
By John Rushby
“Partitioning in avionics architectures” Metadata:
- Title: ➤ Partitioning in avionics architectures
- Author: John Rushby
- Language: English
- Publisher: ➤ National Aeronautics and Space Administration, Langley Research Center - National Technical Information Service, distributor
- Publish Date: 1999
- Publish Location: Hampton, Va - [Springfield, Va
“Partitioning in avionics architectures” Subjects and Themes:
- Subjects: ➤ Architecture (Computers) - Avionics - Automatic flight control - Computer information security - Distributed processing - Fault tolerance
Edition Identifiers:
- The Open Library ID: OL15552430M
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Partitioning in avionics architectures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15A formal model of partitioning for integrated modular avionics
By Ben L. Di Vito
“A formal model of partitioning for integrated modular avionics” Metadata:
- Title: ➤ A formal model of partitioning for integrated modular avionics
- Author: Ben L. Di Vito
- Language: English
- Publisher: ➤ National Technical Information Service, distributor - National Aeronautics and Space Administration, Langley Research Center
- Publish Date: 1998
- Publish Location: Hampton, Va - Springfield, VA
“A formal model of partitioning for integrated modular avionics” Subjects and Themes:
- Subjects: Avionics - Airborne/spaceborne computers - Computer information security - Aircraft industry - Transport aircraft
Edition Identifiers:
- The Open Library ID: OL15547005M
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find A formal model of partitioning for integrated modular avionics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Theft of information in the take-grant protection model
By Matt Bishop
“Theft of information in the take-grant protection model” Metadata:
- Title: ➤ Theft of information in the take-grant protection model
- Author: Matt Bishop
- Language: English
- Publisher: ➤ National Aeronautics and Space Administration - National Technical Information Service, distributor
- Publish Date: 1989
- Publish Location: ➤ Springfield, Va - [Washington, DC
“Theft of information in the take-grant protection model” Subjects and Themes:
- Subjects: ➤ Access control - Computer information security - Information flow - Models - Policies - Protection
Edition Identifiers:
- The Open Library ID: OL15403751M
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Theft of information in the take-grant protection model at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Disaster Management in Telecommunications, Broadcasting and Computer Systems
By Galal El Mahdy

“Disaster Management in Telecommunications, Broadcasting and Computer Systems” Metadata:
- Title: ➤ Disaster Management in Telecommunications, Broadcasting and Computer Systems
- Author: Galal El Mahdy
- Language: English
- Number of Pages: Median: 482
- Publisher: Wiley
- Publish Date: 2001
“Disaster Management in Telecommunications, Broadcasting and Computer Systems” Subjects and Themes:
- Subjects: ➤ Computersystemen - Telecommunicatie - Katastrophenmanagement - COMPUTER INFORMATION SECURITY - Telekommunikation - Omroep - Emergency management - Datenverarbeitung - MANAGEMENT - Telecommunication systems - Datensicherung - Planning - EMERGENICES - Computer security - Security measures - DISASTERS - COMMUNICATION NETWORKS
Edition Identifiers:
- The Open Library ID: OL7619333M
- Library of Congress Control Number (LCCN): 00043826
- All ISBNs: 0471608122 - 9780471608127
First Setence:
"A problem is the cause of an undesired situation; it means that we cannot get the anticipated results from our activities at work."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Disaster Management in Telecommunications, Broadcasting and Computer Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Advances in Computers
Volume 37
By Marshall C. Yovits

“Advances in Computers” Metadata:
- Title: Advances in Computers
- Author: Marshall C. Yovits
- Language: English
- Number of Pages: Median: 377
- Publisher: ➤ Academic Pr - Academic Press Inc.,U.S. - Academic Press - Academic P.
- Publish Date: ➤ 1971 - 1972 - 1975 - 1976 - 1978 - 1979 - 1980 - 1983 - 1984 - 1985 - 1986 - 1987 - 1988 - 1989 - 1990 - 1991 - 1992 - 1993 - 1994
- Publish Location: ➤ San Diego, California - Orlando, Fla - London
“Advances in Computers” Subjects and Themes:
- Subjects: ➤ Electronic data processing - Computers - Collected works - Danish literature - Bio-bibliography - Machine Theory - Reference - General - Hardware - Computer Literacy - Computer science - Data Processing - Information Technology - Bioinformatics - Questions & Answers - Periodicals - ARCHITECTURE (COMPUTERS) - DESIGN ANALYSIS - COMPUTER INFORMATION SECURITY - COMPUTER NETWORKS - MAN-COMPUTER INTERFACE - PROTOCOL (COMPUTERS) - Informática - - Matemáticas - Računalništvo
Edition Identifiers:
- Google Books ID: vL-bB7GALAwC
- The Open Library ID: ➤ OL21118104M - OL18198078M - OL9690815M - OL9780722M - OL10070077M - OL10070078M - OL10070083M - OL10070072M - OL10070097M - OL10070089M - OL10070098M - OL10070095M - OL10070092M - OL10070076M - OL10070096M - OL10070084M - OL10070074M - OL10070073M - OL10070091M - OL10070087M - OL10070082M - OL10070088M - OL10070090M - OL10070085M - OL10070094M - OL10070086M - OL10070093M
- Online Computer Library Center (OCLC) ID: 1461174 - 858439915
- Library of Congress Control Number (LCCN): 59015761
- All ISBNs: ➤ 9780120121304 - 9780120121168 - 9780120121359 - 0120121271 - 0120121220 - 0120121301 - 9780120121298 - 0120121166 - 0120121239 - 0120121379 - 9780120121137 - 0120121395 - 9780120121175 - 9780120121281 - 9780120121373 - 0120121298 - 0120121131 - 9780120121113 - 012012128X - 9780120121236 - 0120121247 - 9780120121267 - 9780120121397 - 0120121174 - 0120121328 - 9780120121229 - 0120121352 - 9780120121182 - 0120121115 - 0120121123 - 9780120121144 - 0120121263 - 0120121387 - 9780120121274 - 9780120121250 - 012012131X - 9780120121366 - 0120121182 - 9780120121380 - 9780120121342 - 0120121255 - 9780120121335 - 0120121344 - 9780120121328 - 012012114X - 9780120121120 - 978-0120121373 - 9780120121311 - 9780120121243 - 0120121360 - 0120121336
First Setence:
"Program Understanding, also referred to as Code Cognition or Program Comprehension, is a central activity during software maintenance, evolution, and reuse."
Author's Alternative Names:
"M. C. Yovits" and "M. Yovits"Access and General Info:
- First Year Published: 1971
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Downloads:
- Number of Results: 8
- 1: advancescomputer14unkn
- 2: advancesincomput0000unse_w1e1
- 3: advancesincomput0000unse_o9a0
- 4: advancesincomput0000unse_v0q1
- 5: advancescomputer11altf
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Advances in Computers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.