Search alternatives:
computer world » computer worlds, computer word, computer works
complete works » complex networks
computer worms » computer works, computer terms, computers work

1
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ...4. Privacy at work -- The Internet at work -- Surfing on company time -- Visit NasteePix.com, get...

2
Published 2017
Springer International Publishing
Table of Contents: ... of Strategy Games on Physarum Machines -- Computing a Worm: Reverse-Engineering Planarian Regeneration...

3 Table of Contents: ...-Based Vulnerabilities -- Application-Based Weaknesses -- How E-mail Works -- Security of E-mail -- Mail...

4
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....The Computer Age -- 6.How AES Works -- 7.Selecting Cryptography: the Process -- 8.Summary -- Chapter Review...

5
by Rao, Umesh Hodeghatta, Nayak, Umesha
Published 2014
ApressOpen, Distributed to the Book trade worldwide by Springer
Table of Contents: ... Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars...

6
by Mischel, Magnus
Published 2009
Packt Pub.
Subjects: ...Firewalls (Computer security) / fast...

7
Published 2022
Packt Publishing
Subjects: ...Cyber intelligence (Computer security) / fast...