Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Indiana State Library.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Indiana State Library.
- Label
- Computer security
- Authority link
- (EG-IN)716413
50 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- Uso compartido de archivos : cómo evaluar los riesgos = file-sharing : evaluate the risks
- A guide to understanding data remanence in automated information systems
- A guide to writing the security features user's guide for trusted systems
- A revised model for role-based access control
- A statistical test suite for random and pseudorandom number generators for cryptographic applications
- A statistical test suite for random and pseudorandom number generators for cryptographic applications
- Analyzing the security of an existing computer system
- Assessing controlled access protection
- Automated security self-evaluation tool user manual
- Coping with data from Space Station Freedom
- Corporate security management : organization and spending since 9/11
- CyberShock : surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption
- E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets
- Entity authentication using public key cryptography
- Establishing a computer security incident response capability (CSIRC)
- File-sharing : a fair share? Maybe not
- General procedures for registering computer security objects
- Good security practices for electronic commerce, including electronic data interchange
- Gray hat hacking : the ethical hacker's handbook
- Guide to Malware incident prevention and handling
- Guide to general server security : recommendations of the National Institute of Standards and Technology
- How personal & Internet security work
- How robust are distributed systems?
- Information warfare : chaos on the electronic superhighway
- Integrating security in a group oriented distributed system
- Integrity and security in an Ada runtime environment
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, secondsession, March 22, 1994
- Keeping your site comfortably secure : an introduction to Internet firewalls
- Managing information security : administrative, electronic, and legal measures to protect business information
- Minimizing the effects of malware on your computer
- Minimum security requirements for multi-user operating systems
- Mobile agent security
- NASA electronic library system (NELS) : the system impact of security
- Protecting your library's digital sources : the essential guide to planning and preservation
- Protection and security on the information superhighway
- Public-key cryptography
- Secure communications : hearing before the Subcommittee on Technology of the Committee on Science, U.S. House of Representatives, One Hundred Fifth Congress, first session, February 11, 1997
- Security for safety critical space borne systems
- Security in distributed computing : did you lock the door?
- Security in open systems
- Security metrics guide for information technology systems
- Seven simple computer security tips for small business and home computer users
- Test results for digital data acquisition tool : EnCase 5.05f
- The "Father Christmas Worm"
- The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures
- The complete guide to Internet security
- The hundredth window : protecting your privacy and security in the age of the Internet
- The keyed-hash message authentication code (HMAC)
- Threats and countermeasures for network security
- Uso compartido de archivos : cómo evaluar los riesgos
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/ycH-OIg33XI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/ycH-OIg33XI/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/ycH-OIg33XI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/ycH-OIg33XI/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>