Computer securityHere are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction. See also what's at Wikipedia, your library, or elsewhere.
Broader terms:Related term:Narrower terms:Used for:- Computer privacy
- Computer system security
- Computer systems -- Protection
- Computer systems -- Security measures
- Computers -- Protection
- Computers -- Security measures
- Cyber security
- Cybersecurity
- Electronic digital computers -- Security measures
- Protection of computer systems
- Security of computer systems
|
Filed under: Computer security- Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net)
- The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink)
- UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com)
- Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
- Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink)
- Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
- Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org)
- The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
- Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com)
- Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
- For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
- A guide to understanding identification and authentication in trusted systems. (National Computer Security Center, 1991), by James Anderson, Rayford Vaughn, and National Computer Security Center (U.S.) (page images at HathiTrust)
- Federal computer systems protection act : hearings before the Subcommittee on Criminal Laws and Procedures of the Committee on the Judiciary, United States Senate, Ninety-fifth Congress, second session, on S. 1766, June 21 and 22, 1978. (U.S. Govt. Print. Off. :, 1979), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Laws and Procedures (page images at HathiTrust)
- Security self-assessment guide for information technology system (U.S. Department of Commerce, Computer Security Division, Information Technology, National Institute of Standards and Technology, 2001), by Marianne Swanson (page images at HathiTrust)
- User authentication (Association of Research Libraries, Office of Leadership and Management Services, 2001), by Richard Bleiler, Terry Plum, and Association of Research Libraries. Office of Leadership and Management Services (page images at HathiTrust; US access only)
- The SRI hierarchical development methodology (HDM) and its application to the development of secure software (U.S. Dept. of Commerce, National Bureau of Standards :, 1980), by Karl N. Levitt, Lawrence Robinson, Peter Neumann, Institute for Computer Sciences and Technology, and United States. National Bureau of Standards (page images at HathiTrust)
- Considerations in the selection of security measures for automatic data processing systems (U.S. Dept. of Commerce, National Bureau of Standards :, 1978), by Michel J. Orceyre, Gloria R. Bolotsky, Robert H. Courtney, United States. National Bureau of Standards, Institute for Computer Sciences and Technology, and International Business Machines Corporation (page images at HathiTrust)
- An analysis of computer security safeguards for detecting and preventing intentional computer misuse (U.S. Dept. of Commerce, National Bureau of Standards :, 1978), by Brian Ruder, Robert P. Blanc, J. D. Madden, United States. National Bureau of Standards, Institute for Computer Sciences and Technology, and Stanford Research Institute (page images at HathiTrust)
- The network security center : a system level approach to computer network security (Dept. of Commerce, National Bureau of Standards :, 1978), by Frank Heinrich, United States. National Bureau of Standards, Institute for Computer Sciences and Technology, and System Development Corporation (page images at HathiTrust)
- Design alternatives for computer network security (U.S. Dept. of Commerce, National Bureau of Standards, 1978), by Gerald D. Cole, Dennis K. Branstad, United States. National Bureau of Standards, and Institute for Computer Sciences and Technology (page images at HathiTrust)
- The encryption debate : criminals, terrorists, and the security needs of business and industry : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session ... September 3, 1997. (U.S. G.P.O. :, 1998), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, secondsession, March 22, 1994. (U.S. G.P.O. :, 1994), by Space United States. Congress. House. Committee on Science (page images at HathiTrust)
- Secure communications : hearing before the Subcommittee on Technology of the Committee on Science, U.S. House of Representatives, One Hundred Fifth Congress, first session, February 11, 1997. (U.S. G.P.O. :, 1997), by United States House Subcommittee on Technology (page images at HathiTrust)
- 15th National Computer Security Conference : October 13-16, 1992, Baltimore Convention Center, Baltimore, MD : proceedings. (National Institute of Standards and Technology, National Computer Security Center :, 1992), by Md.) National Computer Security Conference (15th : 1992 : Baltimore, National Computer Security Center (U.S.), and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Security in the information age : new challenges, new strategies (U.S. Congress, Joint Economic Committee, 2002), by United States. Congress. Joint Economic Committee (page images at HathiTrust)
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011. (U.S. G.P.O. :, 2012), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Information systems security (The Institute, 1994), by National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998 (1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust)
- Computer crime and security ([Washington, D.C.] : The Library of Congress, Congressional Research Service, Major Issues System, [1980], 1980), by Louise Giovane Becker and Library of Congress. Congressional Research Service (page images at HathiTrust)
- A Guide to understanding security modeling in trusted systems. (National Computer Security Center, 1993), by National Computer Security Center (U.S.) (page images at HathiTrust)
Filed under: Computer security -- Asia
Filed under: Computer security -- Australia
Filed under: Computer security -- China
Filed under: Computer security -- Code words
Filed under: Computer security -- Congresses- DCI, Director of Central Intelligence (Document Expedition (DOCEX) Project, Exchange and Gift Division, Library of Congress ;, 1997), by Carnegie Mellon Workshop on Network Security and United States Central Intelligence Agency (page images at HathiTrust)
- 13th National Computer Security Conference, Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 : proceedings : information systems security, standards, the key to the future (The Institute?, 1990), by D.C.) National Computer Security Conference (13th : 1990 : Washington, National Computer Security Center (U.S.), and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- 14th National Computer Security Conference : Omni Shoreham Hotel, Washington, D.C., 1-4 October 1991 : proceedings. (National Institute of Standards and Technology, National Computer Security Center :, 1991), by D.C.) National Computer Security Conference (14th : 1991 : Washington, National Computer Security Center (U.S.), and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Building the information security bridge to the 21st century (National Institute of Standards and Technology ;, 1998), by Va.) National Information Systems Security Conference (21st : 1998 : Arlington, National Computer Security Center (U.S.), and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- 15th National Computer Security Conference : October 13-16, 1992, Baltimore Convention Center, Baltimore, MD : proceedings. (National Institute of Standards and Technology, National Computer Security Center :, 1992), by Md.) National Computer Security Conference (15th : 1992 : Baltimore, National Computer Security Center (U.S.), and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Proceedings (National Institute of Standards and Technology? ;, 1995), by Md.) National Information Systems Security Conference (18th : 1995 : Baltimore, National Computer Security Center (U.S.), and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
Filed under: Computer security -- Evaluation- A guide to understanding covert channel analysis of trusted systems. (National Computer Security Center, 1994), by Virgil D. Gligor and National Computer Security Center (U.S.) (page images at HathiTrust)
- Transportation challenges and cybersecurity post-9/11 : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, December 2, 2009 (U.S. G.P.O. :, 2010), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
Filed under: Computer security -- Government policy- Cyber Security Research and Development Act : report to accompany H.R. 3394 including cost estimate of the Congressional Budget Office. (U.S. G.P.O., 2002), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Are we prepared for cyberwar? (U.S. G.P.O., 2000), by Information United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management (page images at HathiTrust)
- Computer crime and security ([Washington, D.C.] : The Library of Congress, Congressional Research Service, Major Issues System, [1980], 1980), by Louise Giovane Becker and Library of Congress. Congressional Research Service (page images at HathiTrust)
More items available under narrower terms. |