Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("damages" OR "damage")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
Showing
1
-
20
of
121
Search:
'("damages" OR "damage")'
,
query time: 0.04s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Structural Health Monitoring Based on Data Science Techniques
Published 2022
Springer International Publishing
Table of Contents:
“
... (Caterina Bigoni) -- Chapter 10. Unsupervised data-driven methods for
damage
identification in discontinuous...
”
Read Now
2
Ransomware protection playbook
by
Grimes, Roger A.
Published 2022
Wiley
Table of Contents:
“
... ; Minimizing
Damage
; Early Responses ; Environment Recovery ; Next Steps ; What Not to Do ; Future...
”
Call Number:
QA76.76.C68
Read Now
3
Information security breaches : avoidance treatment based on ISO27001
by
Krausz, Michael
Published 2014
IT Governance Press
Table of Contents:
“
...: Treatment using ISO27001; Assess the
damage
; Past or future?; Initiate an investigation, secure all evidence...
”
Call Number:
QA76.9.A25
Read Now
4
Digital Hampi: Preserving Indian Cultural Heritage
Published 2017
Springer Nature Singapore
Table of Contents:
“
..., Representation & Display of Digital Heritage Sites -- Chapter 2. A Methodology to reconstruct large
damaged
...
”
Read Now
5
The Expression of Knowledge : Neurobehavioral Transformations of Information into Action
by
Isaacson, Robert L.
,
Spear, Norman E.
Published 1982
Springer US
Table of Contents:
“
... and Reintegration Following Lateral Hypothalamic
Damage
-- 3. Sensory Neglect: An Activational Deficit -- 4...
”
Read Now
6
Information Security Breaches : Avoidance and Treatment based on ISO27001
by
Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents:
“
... the
damage
; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...
”
Call Number:
QA76.9.A25
Read Now
7
Cyber Situational Awareness : Issues and Research
Published 2010
Springer US
Table of Contents:
“
... Awareness -- Topological Vulnerability Analysis -- Cross-Layer
Damage
Assessment for Cyber Situational...
”
Read Now
8
Deploying and administering Windows Vista bible
by
Kelly, Bob
Published 2008
Wiley
Table of Contents:
“
.... Protecting User Data -- Ch. 13. Recovering
Damaged
Systems and Lost Data...
”
Call Number:
QA76.76.O63
Read Now
9
Integrity and Internal Control in Information Systems VI : IFIP TC11 / WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13–14 Novemb...
Published 2004
Springer US
Table of Contents:
“
... Oriented System Based Information Flow Model for
Damage
Assessment -- An Efficient OODB Model for Ensuring...
”
Read Now
10
Handbook of Database Security : Applications and Trends
Published 2008
Springer US
Table of Contents:
“
... -- Trustworthy Records Retention --
Damage
Quarantine and Recovery in Data Processing Systems -- Hippocratic...
”
Read Now
11
Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Bu...
Published 1998
Springer US
Table of Contents:
“
... for databases with explicit markings of
damaged
data -- 7 Application of models from epidemiology to metrics...
”
Read Now
12
Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
by
Walker, Andy
Published 2009
Que
Table of Contents:
“
... Network -- pt. II. Hardcore Help for Safe and Secure Computing -- 8.
Damage
Control -- How to Remove...
”
Call Number:
QA76.9.A25
Read Now
13
Mobile Internet Security : Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers
Published 2019
Springer Nature Singapore
Table of Contents:
“
...-based Cyber Influence
Damage
Assessment for Exploit in Mobile Device -- Method for predicting pixel...
”
Read Now
14
A cyberworm that knows no boundaries
by
Porche, Isaac
Published 2011
RAND Corp.
Table of Contents:
“
...
Damage
from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes...
”
Call Number:
QA76.76.C68
Read Now
15
Progress in Cryptology - VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers
Published 2006
Springer Berlin Heidelberg
Table of Contents:
“
... Rate -- Reducing the Spread of
Damage
of Key Exposures in Key-Insulated Encryption...
”
Read Now
16
How personal & Internet security works
by
Gralla, Preston
Published 2006
Que Pub.
Table of Contents:
“
... do their
damage
and how to protect against them -- Wi-Fi security dangers and protections...
”
Call Number:
HV6673
Read Now
17
Data breaches : crisis and opportunity
by
Davidoff, Sherri
Published 2020
Addison-Wesley
“
... the world's most
damaging
breaches, Davidoff identifies proven tactics for reducing
damage
caused...
”
Call Number:
TK5105.59
Read Now
18
Trust, Privacy and Security in Digital Business : 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings
Published 2012
Springer Berlin Heidelberg
Table of Contents:
“
... Undeniable Signature Scheme --
Damage
Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation...
”
Read Now
19
Key Technologies for Data Management : 21st British National Conference on Databases, BNCOD 21, Edinburgh, UK, July 7-9, 2004, Proceedings
Published 2004
Springer Berlin Heidelberg
Table of Contents:
“
...
Damage
Assessment Latency in Survivable Databases -- XML -- Efficient Processing of Multiple Structural...
”
Read Now
20
Automatic Malware Analysis : An Emulator Based Approach
by
Yin, Heng
,
Song, Dawn
Published 2013
Springer New York
“
... for decades and has caused billions of dollars
damages
each year. A large volume of new malware samples...
”
1
2
3
4
5
6
7
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
331 - Labor economics
27
364 - Criminology
11
500 - Natural sciences & mathematics
11
658 - General management
9
330 - Economics
7
more ...
004 - Data processing & computer science
6
003 - Systems
5
620 - Engineering & allied operations
5
338 - Production
3
384 - Communications; telecommunication
3
374 - Adult education
2
001 - Knowledge
1
368 - Insurance
1
600 - Technology
1
670 - Manufacturing
1
see all ...
less ...
Language
English
119
Undetermined
2
Collection
O'Reilly
54
Springer eBooks 2005-
52
Springer Book Archives -2004
14
JSTOR Open Access Books
1
Author
Jajodia, Sushil
5
Krausz, Michael
3
Aslam, Abdul
2
Ayala, Luis
2
Chaudhury, Santanu
2
Cherry, Denny
2
more ...
Davidoff, Sherri
2
Dunkerley, Dawn
2
Hassan, Nihad A.
2
Meyers, Mike
2
Simmons, Ken
2
Van Wyk, Kenneth R.
2
Waschke, Marvin
2
Williams, Chris K.
2
Abbate, Andrew
1
Abramowicz, Witold
1
Abreu, Pedro Henriques
1
Ali, Md. Asraf
1
Antona, Margherita
1
Appleman, Dan
1
Augusti, Guiliano
1
Batini, Carlo
1
Bejtlich, Richard
1
Bertino, Elisa
1
Bhuiyan, Touhid
1
Bochman, Andrew A.
1
Bolt, Steven
1
Borri, Antonio
1
Branigan, Steven
1
Brumfield, Cynthia
1
Calder, Alan
1
Cann, Natalie M.
1
Carstarphen, Sylvester
1
Chanda, Bhabatosh
1
Chandru, Vijay
1
Chaudhuri, Subhasis
1
Chen, Hsinchun
1
Chen, Hsing-Chung
1
Chen, Lei
1
Chiang, Yao-Yi
1
Chimner, Scott
1
Choi, Bong Jun
1
Chung, Wan-Young
1
Chuprunov, Maxim
1
Coburn, Andrew
1
Colanzi, Thelma Elita
1
Computing Technology Industry Association
1
Cury, Alexandre
1
D'Agostino, Gregorio
1
Davida, George I.
1
Davis, Robert
1
De Capitani di Vimercati, Sabrina
1
Deyalsingh, Jason
1
Dietrich, Sven
1
Dinsmore, J.
1
Dittrich, David
1
Doermann, David
1
Donaldson, Scott
1
Donaldson, Scott E.
1
Durrin, Matt
1
Elovici, Yuval
1
Fang, Xiaowen
1
Fellner, Dieter
1
Ferbrache, David
1
Fernández, Alberto
1
Fichera, Joe
1
Fischer-Hübner, Simone
1
Flusser, Jan
1
Forno, Richard
1
Frankel, Yair
1
Freeman, Sarah G.
1
Fry, Chris
1
Gama, João
1
Gao, Yunjun
1
Georgopoulos, Andreas
1
Gertz, Michael
1
Ghosh, R.K.
1
Graff, Mark
1
Gralla, Preston
1
Greenwood, Tom
1
Gregg, Michael
1
Grimes, Roger A.
1
Gupta, P.K.
1
Hadjimitsis, Diofantos
1
Hagiya, Masami
1
Harris, Don
1
Haugli, Brian
1
Hoepman, Jaap-Henk
1
Honig, Andrew
1
Hu, Xiaodong
1
Humphrey, Watts S.
1
Hunter, John M.
1
Hypponen, Mikko
1
Indrakshi, Ray
1
Ioannides, Marinos
1
Isaacson, Robert L.
1
Janetscheck, Tom
1
Jiang, Jiaojiao
1
Johnson, Ann
1
Jürjens, Jan
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&lookfor=%28%22damages%22+OR+%22damage%22%29&type=AllFields
Send by Email
×
Loading...