Explore: Computers Computer Security

Discover books, insights, and more — all in one place.

Learn more about Computers Computer Security with top reads curated from trusted sources — all in one place.

Topic Search

Search for any topic

AI-Generated Overview About “computers---computer-security”:


Books Results

Source: The Open Library

The Open Library Search Results

Search results from The Open Library

1Computer Security Basics

By

Book's cover

“Computer Security Basics” Metadata:

  • Title: Computer Security Basics
  • Authors:
  • Language: English
  • Number of Pages: Median: 448
  • Publisher: ➤  O'Reilly & Associates - O'Reilly Media, Incorporated - O'Reilly - O'Reilly Media, Inc.
  • Publish Date:
  • Publish Location: ➤  Sebastopol, Calif - Sebastopol, CA - Cambridge, MA

“Computer Security Basics” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 1991
  • Is Full Text Available: Yes
  • Is The Book Public: No
  • Access Status: Borrowable

Online Access

Downloads Are Not Available:

The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

Online Borrowing:

Online Marketplaces

Find Computer Security Basics at online marketplaces:


2Hack Proofing Your Network

By

Book's cover

“Hack Proofing Your Network” Metadata:

  • Title: Hack Proofing Your Network
  • Authors: ➤  
  • Language: English
  • Number of Pages: Median: 824
  • Publisher: Syngress
  • Publish Date:

“Hack Proofing Your Network” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2002
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: Unclassified

Online Access

Downloads Are Not Available:

The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

Online Borrowing:

    Online Marketplaces

    Find Hack Proofing Your Network at online marketplaces:


    3Essential Computer Security

    By

    Book's cover

    “Essential Computer Security” Metadata:

    • Title: Essential Computer Security
    • Author:
    • Language: English
    • Number of Pages: Median: 360
    • Publisher: Syngress
    • Publish Date:

    “Essential Computer Security” Subjects and Themes:

    Edition Identifiers:

    Access and General Info:

    • First Year Published: 2006
    • Is Full Text Available: Yes
    • Is The Book Public: No
    • Access Status: Printdisabled

    Online Access

    Downloads Are Not Available:

    The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

    Online Borrowing:

      Online Marketplaces

      Find Essential Computer Security at online marketplaces:



      Wiki

      Source: Wikipedia

      Wikipedia Results

      Search Results from Wikipedia

      Computer security

      Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security

      Exploit (computer security)

      integrity and security of computer systems. Exploits can cause unintended or unanticipated behavior in systems, potentially leading to severe security breaches

      Threat (computer security)

      In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system

      Sandbox (computer security)

      In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software

      Computer security policy

      A computer security policy defines the goals and elements of an organization's computer systems. The definition can be highly formal or informal. Security

      Computer security conference

      A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network

      Vulnerability (computer security)

       13–14. Kakareka, Almantas (2009). "23". In Vacca, John (ed.). Computer and Information Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 393

      Computer worm

      relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new

      Computer security software

      defense of computers against intrusion and unauthorized use of resources is called computer security. Similarly, the defense of computer networks is

      Computer virus

      E.C.J.; Araujo, Vanessa O. (2008). "Dynamic models for computer viruses". Computers & Security. 27 (7–8): 355–359. doi:10.1016/j.cose.2008.07.006. ISSN 0167-4048