Computer securityHere are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction. See also what's at Wikipedia, your library, or elsewhere.
Broader terms:Narrower terms:Used for:- Computer privacy
- Computer system security
- Computer systems -- Security measures
- Computers -- Security measures
- Electronic digital computers -- Security measures
- Security of computer systems
|
Filed under: Computer security Computers at Risk: Safe Computing in the Information Age, by National Research Council Computer Science and Telecommunications Board (page images at NAP) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP) A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Intrusion Detection With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (2003), by Rafeeq Ur Rehman (PDF at phptr.com) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at phptr.com) Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com) Security Engineering: A Guide to Building Dependable Distributed Systems (2001), by Ross Anderson (PDF files with commentary in the UK)
Filed under: Computer security -- Australia
Filed under: Computer security -- Law and legislation -- Australia
Filed under: Computer security -- Government policy -- United StatesFiled under: Computer security -- Law and legislation
Filed under: Computer security -- Law and legislation -- Great BritainFiled under: Computer security -- United StatesFiled under: Computer networks -- Security measures Cyber Infrastructure Protection (2011), ed. by Tarek Nazir Saadawi and Louis Jordan (PDF with commentary at army.mil) Digital Identity, an Emergent Legal Concept: The Role and Legal Nature of Digital Identity in Commercial Transactions (Adelaide: University of Adelaide Press, c2011), by Clare Sullivan (PDF with commentary at Adelaide) The Internet Under Crisis Conditions: Learning from September 11, by National Research Council Computer Science and Telecommunications Board (page images at NAP) Intrusion Detection With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (2003), by Rafeeq Ur Rehman (PDF at phptr.com) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at phptr.com) Stacks: Interoperability in Today's Computer Networks (c1992), by Carl Malamud (page images at Google) Trust in Cyberspace, ed. by Fred B. Schneider (HTML and page images at NAP)
Filed under: Computer networks -- Security measures -- Government policy -- United StatesFiled under: Business enterprises -- Computer networks -- Security measuresFiled under: Computers -- Access control Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (HTML at fas.org) Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (illustrated HTML at cryptome.org and other sites) A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org) A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) Intrusion Detection With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (2003), by Rafeeq Ur Rehman (PDF at phptr.com) Rating Maintenance Phase Program Document, by Tommy Hammer (HTML at usmc.mil) Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (HTML at usmc.mil)
Filed under: Computers -- Access control -- Handbooks, manuals, etc.Filed under: Computers -- Access control -- PeriodicalsFiled under: Computers -- United States -- Access controlFiled under: Data encryption (Computer science)
Filed under: Data encryption (Computer science) -- Research
Filed under: Digital libraries -- Access control -- United StatesFiled under: Electronic information resources -- Access control
Items below (if any) are from related and broader terms.
Filed under: Data protection
Filed under: Data protection -- Costs
Filed under: Data protection -- Law and legislation
Filed under: Data protection -- United StatesMore items available under broader and related terms at left. |