Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Forsyth County Public Library.This resource has been enriched with EBSCO NoveList data.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Forsyth County Public Library.
This resource has been enriched with EBSCO NoveList data.
- Label
- Computer security
68 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- trueAttack surface
- Big Brother, big business : data-mining and surveillance industries
- trueBreaking and entering : the extraordinary story of a hacker called "Alien"
- Can You hack it? : attack on personal information
- trueCan you crack the code? : a fascinating history of ciphers and cryptography
- Computer forensics : infoSec Pro guide
- Computer security
- Computer worms and viruses
- Cracking codes with Python : an introduction to building and breaking ciphers
- trueCryptography : the key to digital security, how it works, and why it matters
- Cult of the dead cow : how the original hacking supergroup might just save the world
- Cult of the dead cow : how the original hacking supergroup might just save the world
- trueCyber spies and secret agents of modern times
- Cyber wars : the hacker as hero
- CyberSafety
- CyberSecurity
- trueCybercrime : data trails do tell tales
- Cybercrime : invisible threat
- Cybercrime : world wide war 3.0
- Cybersecurity
- Data : Ethical Use and Storage
- trueData and Goliath : the hidden battles to collect your data and control your world
- trueDawn of the code war : America's battle against Russia, China, and the rising global cyber threat
- Digital dark age? : gambling with humankind's knowledge
- Digital security : : cyber terror and cyber security
- trueExploding data : reclaiming our cyber security in the digital age
- trueFuture crimes : everything is connected, everyone is vulnerable, and what we can do about it
- trueGhost in the wires : my adventures as the world's most wanted hacker
- Ghost in the wires : my adventures as the world's most wanted hacker
- Hacking for dummies
- Heists
- Identity Theft
- trueIn too deep
- trueKingdom of lies : unnerving adventures in the world of cybercrime
- trueKompromat : how Russia undermined American democracy
- Living with the Internet and online dangers
- trueLiving with the Internet and online dangers
- trueMessing with the enemy : surviving in a social media world of hackers, terrorists, Russians, and fake news
- Modern marvels, spy technology
- trueOwn your space : keep yourself and your stuff safe online
- Piracy
- Privacy and security
- Privacy, security, and cyberspace
- Rise of the hackers
- Rise of the machines : will civilian drones reshape American life?
- trueRules of engagement
- Safeguarding your privacy at home and work
- trueSandworm : a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers
- Sc@mmed : online identity theft
- Science of surveillance
- Securing the web
- Security Start-Up : Selling Safety
- Spam
- Surveillance
- TEDTalks : Avi Rubin - All Your Devices Can Be Hacked
- TEDTalks : Mikko Hypponen, Fighting Viruses, Defending the Net
- TEDTalks : Misha Glenny, Hire the Hackers!
- trueThe A list : an Ali Reynolds mystery
- trueThe Pandora deception
- trueThe art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
- trueThe fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- Think b4 u Post : Your Reputation and Privacy on Social Networking Sites
- trueThis Is How They Tell Me the World Ends : The Cyberweapons Arms Race
- Viruses and spam
- Watching me watching you : nanotechnology and civil liberties
- Whatever happened to privacy?
- Zero days : white hat and black hat hackers
- e-Pirates of the Digital Age : Copyright Issues in Software and Music
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.forsythpl.org/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.forsythpl.org/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.forsythpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.forsythpl.org/">Forsyth County Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.forsythpl.org/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.forsythpl.org/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.forsythpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.forsythpl.org/">Forsyth County Public Library</a></span></span></span></span></div>