Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "damage"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
Showing
1
-
20
of
121
Search:
'"damage"'
,
query time: 0.04s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Structural Health Monitoring Based on Data Science Techniques
Published 2022
Springer International Publishing
Table of Contents:
“
... (Caterina Bigoni) -- Chapter 10. Unsupervised data-driven methods for
damage
identification in discontinuous...
”
Read Now
2
Data breaches : crisis and opportunity
by
Davidoff, Sherri
Published 2020
Addison-Wesley
“
... the world's most
damaging
breaches, Davidoff identifies proven tactics for reducing
damage
caused...
”
Call Number:
TK5105.59
Read Now
3
Ransomware protection playbook
by
Grimes, Roger A.
Published 2022
Wiley
Table of Contents:
“
... ; Minimizing
Damage
; Early Responses ; Environment Recovery ; Next Steps ; What Not to Do ; Future...
”
Call Number:
QA76.76.C68
Read Now
4
Information security breaches : avoidance treatment based on ISO27001
by
Krausz, Michael
Published 2014
IT Governance Press
Table of Contents:
“
...: Treatment using ISO27001; Assess the
damage
; Past or future?; Initiate an investigation, secure all evidence...
”
Call Number:
QA76.9.A25
Read Now
5
Digital Hampi: Preserving Indian Cultural Heritage
Published 2017
Springer Nature Singapore
Table of Contents:
“
..., Representation & Display of Digital Heritage Sites -- Chapter 2. A Methodology to reconstruct large
damaged
...
”
Read Now
6
INCIDENT RESPONSE IN THE AGE OF CLOUD : techniques and best practices to effectively respond to... cybersecurity incidents
by
OZKAYA, DR ERDAL.
Published 2021
PACKT PUBLISHING LIMITED
“
... and control cyber threats and network security breaches in a way that decreases
damage
, recovery time...
”
Call Number:
QA76.9.A25
Read Now
7
The Expression of Knowledge : Neurobehavioral Transformations of Information into Action
by
Isaacson, Robert L.
,
Spear, Norman E.
Published 1982
Springer US
Table of Contents:
“
... and Reintegration Following Lateral Hypothalamic
Damage
-- 3. Sensory Neglect: An Activational Deficit -- 4...
”
Read Now
8
The true cost of information security breaches and cyber crime
by
Krausz, Michael
Published 2013
IT Governance Pub.
“
... or information breach and explains how managers can determine the business
damage
caused...
”
Call Number:
QA76.9.A25
Read Now
9
Information Security Breaches : Avoidance and Treatment based on ISO27001
by
Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents:
“
... the
damage
; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...
”
Call Number:
QA76.9.A25
Read Now
10
Guide to Computer Viruses : How to avoid them, how to get rid of them, and how to get help
by
Slade, Robert
Published 1994
Springer New York
“
... of the known viruses and of the
damage
that they have done, as well as providing guidelines and recommendations...
”
Read Now
11
Sustainable Web Design
by
Greenwood, Tom
Published 2021
A Book Apart
“
..., thoughtful changes in design and development can reduce the
damage
, while also making the web more resilient...
”
Call Number:
QA76.76.A65
Read Now
12
Secure Systems Development with UML
by
Jürjens, Jan
Published 2005
Springer Berlin Heidelberg
“
...Attacks against computer systems can cause considerable economic or physical
damage
. High-quality...
”
Read Now
13
How to survive a data breach : a pocket guide
by
Mitchell, Stewart
Published 2009
IT Governance Pub.
“
... the key measures you need to take to handle the situation and to minimise the
damage
. The information...
”
Call Number:
QA76.9.D314
Read Now
14
The Biomechanics of the Tactile Perception of Friction
by
Willemet, Laurence
Published 2022
Springer International Publishing
“
... force that holds an object strong enough to avoid a catastrophic fall yet gentle enough not to
damage
...
”
Read Now
15
Personal cybersecurity : how to avoid and recover from cybercrime
by
Waschke, Marvin
Published 2017
Apress
Call Number:
QA76.9.A25
Read Now
16
Personal Cybersecurity : How to Avoid and Recover from Cybercrime
by
Waschke, Marvin
Published 2017
Apress
Read Now
17
Cyber Situational Awareness : Issues and Research
Published 2010
Springer US
Table of Contents:
“
... Awareness -- Topological Vulnerability Analysis -- Cross-Layer
Damage
Assessment for Cyber Situational...
”
Read Now
18
Deploying and administering Windows Vista bible
by
Kelly, Bob
Published 2008
Wiley
Table of Contents:
“
.... Protecting User Data -- Ch. 13. Recovering
Damaged
Systems and Lost Data...
”
Call Number:
QA76.76.O63
Read Now
19
Integrity and Internal Control in Information Systems VI : IFIP TC11 / WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13–14 Novemb...
Published 2004
Springer US
Table of Contents:
“
... Oriented System Based Information Flow Model for
Damage
Assessment -- An Efficient OODB Model for Ensuring...
”
Read Now
20
Spring Security in action
by
Spilcă, Laurenţiu
Published 2020
Manning Publications Co.
“
...
damage
. You'll start with the basics, simulating password upgrades and adding multiple types...
”
Call Number:
QA76.9.A25
1
2
3
4
5
6
7
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
331 - Labor economics
27
364 - Criminology
11
500 - Natural sciences & mathematics
11
658 - General management
9
330 - Economics
7
more ...
004 - Data processing & computer science
6
003 - Systems
5
620 - Engineering & allied operations
5
338 - Production
3
384 - Communications; telecommunication
3
374 - Adult education
2
001 - Knowledge
1
368 - Insurance
1
600 - Technology
1
670 - Manufacturing
1
see all ...
less ...
Language
English
119
Undetermined
2
Collection
O'Reilly
54
Springer eBooks 2005-
52
Springer Book Archives -2004
14
JSTOR Open Access Books
1
Author
Jajodia, Sushil
5
Krausz, Michael
3
Aslam, Abdul
2
Ayala, Luis
2
Chaudhury, Santanu
2
Cherry, Denny
2
more ...
Davidoff, Sherri
2
Dunkerley, Dawn
2
Hassan, Nihad A.
2
Meyers, Mike
2
Simmons, Ken
2
Van Wyk, Kenneth R.
2
Waschke, Marvin
2
Williams, Chris K.
2
Abbate, Andrew
1
Abramowicz, Witold
1
Abreu, Pedro Henriques
1
Ali, Md. Asraf
1
Antona, Margherita
1
Appleman, Dan
1
Augusti, Guiliano
1
Batini, Carlo
1
Bejtlich, Richard
1
Bertino, Elisa
1
Bhuiyan, Touhid
1
Bochman, Andrew A.
1
Bolt, Steven
1
Borri, Antonio
1
Branigan, Steven
1
Brumfield, Cynthia
1
Calder, Alan
1
Cann, Natalie M.
1
Carstarphen, Sylvester
1
Chanda, Bhabatosh
1
Chandru, Vijay
1
Chaudhuri, Subhasis
1
Chen, Hsinchun
1
Chen, Hsing-Chung
1
Chen, Lei
1
Chiang, Yao-Yi
1
Chimner, Scott
1
Choi, Bong Jun
1
Chung, Wan-Young
1
Chuprunov, Maxim
1
Coburn, Andrew
1
Colanzi, Thelma Elita
1
Computing Technology Industry Association
1
Cury, Alexandre
1
D'Agostino, Gregorio
1
Davida, George I.
1
Davis, Robert
1
De Capitani di Vimercati, Sabrina
1
Deyalsingh, Jason
1
Dietrich, Sven
1
Dinsmore, J.
1
Dittrich, David
1
Doermann, David
1
Donaldson, Scott
1
Donaldson, Scott E.
1
Durrin, Matt
1
Elovici, Yuval
1
Fang, Xiaowen
1
Fellner, Dieter
1
Ferbrache, David
1
Fernández, Alberto
1
Fichera, Joe
1
Fischer-Hübner, Simone
1
Flusser, Jan
1
Forno, Richard
1
Frankel, Yair
1
Freeman, Sarah G.
1
Fry, Chris
1
Gama, João
1
Gao, Yunjun
1
Georgopoulos, Andreas
1
Gertz, Michael
1
Ghosh, R.K.
1
Graff, Mark
1
Gralla, Preston
1
Greenwood, Tom
1
Gregg, Michael
1
Grimes, Roger A.
1
Gupta, P.K.
1
Hadjimitsis, Diofantos
1
Hagiya, Masami
1
Harris, Don
1
Haugli, Brian
1
Hoepman, Jaap-Henk
1
Honig, Andrew
1
Hu, Xiaodong
1
Humphrey, Watts S.
1
Hunter, John M.
1
Hypponen, Mikko
1
Indrakshi, Ray
1
Ioannides, Marinos
1
Isaacson, Robert L.
1
Janetscheck, Tom
1
Jiang, Jiaojiao
1
Johnson, Ann
1
Jürjens, Jan
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&lookfor=%22damage%22&type=AllFields
Send by Email
×
Loading...