Search alternatives:
computer worlds » computer world, computer works, computer word
complete works » complex networks
computer worms » computer works, computer terms, computers work

1
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ...1. Privacy at risk -- The spy on your desk -- Dawn of the undead PC -- Working for the man...

2
Published 2017
Springer International Publishing
Table of Contents: ... of Strategy Games on Physarum Machines -- Computing a Worm: Reverse-Engineering Planarian Regeneration...

3 Table of Contents: ...-Based Vulnerabilities -- Application-Based Weaknesses -- How E-mail Works -- Security of E-mail -- Mail...

4
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....The Computer Age -- 6.How AES Works -- 7.Selecting Cryptography: the Process -- 8.Summary -- Chapter Review...

5
by Rao, Umesh Hodeghatta, Nayak, Umesha
Published 2014
ApressOpen, Distributed to the Book trade worldwide by Springer
Table of Contents: ... Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars...

6
by Mischel, Magnus
Published 2009
Packt Pub.
Subjects: ...Computer security / Software / blmlsh...

7
Published 2022
Packt Publishing
Subjects: ...Cyber intelligence (Computer security) / http://id.loc.gov/authorities/subjects/sh2011005959...