Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
 More Resources
     
Limit search to available items
Add All On Page to My List
Subjects (1-9 of 9)
Computer security
1

-- See Also the narrower term Computer networks Security measures



--subdivision Computer networks--Security measures under subjects
2

-- See Also the narrower term Computers Access control


3

-- See Also the narrower term Cyber intelligence (Computer security)


Here are entered works on tracking, analyzing, and countering digital security threats. Works on the collection and processing, for subsequent intelligence purposes, of information derived primarily from electronic signals that do not contain speech or text are entered under Electronic intelligence.
4

-- See Also the narrower term Data encryption (Computer science)



--subdivision Code words under topical subdivisions, e.g. Computers--Access control--Code words
5

-- See Also the narrower term Database security


6
7

-- See Also Hacking


Here are entered works on unauthorized changes to computer files, systems, or networks as well as to works on third-party programmatic changes to a file, network, game, or other electronic device.
9

-- See Also the narrower term Penetration testing (Computer security)


Add All On Page to My List
locate in results
More Information
Find another book like this Computer scientists -- Biography -- Sound recordi at Novelist