Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Computer security
- Authority link
- http://id.loc.gov/authorities/subjects/sh90001862
23 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- Computers at risk : safe computing in the information age
- Crypto : how the code rebels beat the government, saving privacy in the digital age
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cybercrime & security
- Cybersecurity and human rights in the age of cyberveillance
- Cybersecurity and human rights in the age of cyberveillance
- Data and Goliath : the hidden battles to collect your data and control your world
- Data privacy in the information age
- Examination of the GAO audit series of HHS cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, June 20, 2018
- Federal computer systems protection act : hearings before the Subcommittee on Criminal Laws and Procedures of the Committee on the Judiciary, United States Senate, Ninety-fifth Congress, second session, on S. 1766, June 21 and 22, 1978
- Fighting computer crime : a new framework for protecting information
- IT security management manual
- Investigative data mining for security and criminal detection
- Privacy and identity in a networked society : refining privacy impact assessment
- Privacy law : new developments & issues in a security-conscious world : a satellite program
- Privacy, confidentiality, and health research
- Protection and security on the information superhighway
- Rethinking public key infrastructures and digital certificates : building in privacy
- Security and privacy in computer systems
- Stemming the exploitation of ICT threats and vulnerabilities : an overview of current trends, enabling dynamics and private sector responses
- System implications of information privacy
- The crypto controversy : a key conflict in the Information Society
- Understanding digital signatures : establishing trust over the Internet and other networks
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/uqfNAhJPpT8/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/uqfNAhJPpT8/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/uqfNAhJPpT8/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/uqfNAhJPpT8/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>