|
Cyber security
|
Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction --subdivision Security measures under names of individual computers, networks, and systems, e.g. IBM computers--Security measures
|
|
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
|
|
Add Marked to Bag
Add All On Page
|
|