Computer security
Resource Information
The topic Computer security represents a specific aggregation or gathering of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Computer security
Resource Information
The topic Computer security represents a specific aggregation or gathering of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Computer security
793 Items that are about the Topic Computer security
Context
Context of Computer securityFocus of
No resources found
No enriched resources found
- Computer security
- Computer security
- Computer security -- California | Laguna Niguel
- Computer security -- California | Laguna Niguel -- Evaluation
- Computer security -- Case studies
- Computer security -- China
- Computer security -- Congresses
- Computer security -- Congresses
- Computer security -- Developing countries
- Computer security -- Employees | Recruiting | Government policy -- United States
- Computer security -- Employees | Training of
- Computer security -- Employees | Training of -- United States
- Computer security -- Employees | Training of | Government policy -- United States
- Computer security -- Europe
- Computer security -- Europe -- Congresses
- Computer security -- Germany -- Criminal provisions
- Computer security -- Government policy
- Computer security -- Government policy
- Computer security -- Government policy -- United States
- Computer security -- Government policy -- United States
- Computer security -- Government policy -- United States -- Auditing -- Periodicals
- Computer security -- Government policy -- United States -- Evaluation
- Computer security -- Government policy -- United States -- Evaluation -- Periodicals
- Computer security -- Great Britain
- Computer security -- Handbooks, manuals, etc
- Computer security -- Insurance -- United States
- Computer security -- International Cooperation -- Congresses
- Computer security -- International cooperation
- Computer security -- Law and legislation
- Computer security -- Law and legislation
- Computer security -- Law and legislation
- Computer security -- Law and legislation -- Africa
- Computer security -- Law and legislation -- Canada
- Computer security -- Law and legislation -- China
- Computer security -- Law and legislation -- Congo (Democratic Republic)
- Computer security -- Law and legislation -- Congresses
- Computer security -- Law and legislation -- Developing countries
- Computer security -- Law and legislation -- Europe
- Computer security -- Law and legislation -- European Union countries
- Computer security -- Law and legislation -- European Union countries -- Congresses
- Computer security -- Law and legislation -- Germany
- Computer security -- Law and legislation -- Israel
- Computer security -- Law and legislation -- Pennsylvania
- Computer security -- Law and legislation -- Periodicals
- Computer security -- Law and legislation -- Singapore
- Computer security -- Law and legislation -- Switzerland -- Criminal provisions
- Computer security -- Law and legislation -- United States
- Computer security -- Law and legislation -- United States
- Computer security -- Law and legislation -- United States -- Congresses
- Computer security -- Law and legislation -- United States -- Evaluation
- Computer security -- Law and legislation -- United States -- States
- Computer security -- Law and legislation | Compliance costs -- United States
- Computer security -- Law and legislation | Economic aspects
- Computer security -- Massachusetts
- Computer security -- New Mexico | Los Alamos
- Computer security -- New York (State)
- Computer security -- Periodicals
- Computer security -- Periodicals
- Computer security -- Research -- United States
- Computer security -- Research -- United States -- Finance
- Computer security -- Research | Government policy -- United States
- Computer security -- Scholarships, fellowships, etc. -- United States
- Computer security -- Sex differences
- Computer security -- South Dakota
- Computer security -- Standards
- Computer security -- Standards
- Computer security -- Standards -- United States
- Computer security -- Study and teaching -- United States
- Computer security -- Study and teaching -- United States -- Finance
- Computer security -- Study and teaching | Government policy -- United States
- Computer security -- Technological innovations -- United States
- Computer security -- Testing | Government policy -- United States
- Computer security -- United States
- Computer security -- United States
- Computer security -- United States -- Case studies
- Computer security -- United States -- Congresses
- Computer security -- United States -- Costs -- Periodicals
- Computer security -- United States -- Employees | Recruiting
- Computer security -- United States -- Encyclopedias
- Computer security -- United States -- Evaluation
- Computer security -- United States -- Finance
- Computer security -- United States -- Handbooks, manuals, etc
- Computer security -- United States -- Management
- Computer security -- United States -- Management -- Case studies
- Computer security -- United States -- Management | Evaluation
- Computer security -- United States -- Outlines, syllabi, etc
- Computer security -- United States -- Planning
- Computer security -- United States -- Planning | Evaluation
- Computer security -- United States -- Public opinion
- Computer security -- United States -- States
- Computer security -- United States -- Study guides
- Computer security -- United States -- Testing
- Computer security -- Washington (D.C.)
- Computer security
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/bPm1x4xfNBs/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/bPm1x4xfNBs/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Topic Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/bPm1x4xfNBs/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/bPm1x4xfNBs/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>