Computer security
Resource Information
The topic Computer security represents a specific aggregation or gathering of resources found in University of San Diego Libraries.
The Resource
Computer security
Resource Information
The topic Computer security represents a specific aggregation or gathering of resources found in University of San Diego Libraries.
- Label
- Computer security
A sample of Items that are about the Topic Computer security See All
Context
Context of Computer securityFocus of
No resources found
No enriched resources found
- Computer security
- Computer security
- Computer security
- Computer security
- Computer security -- Asia
- Computer security -- Auditing
- Computer security -- Auditing
- Computer security -- Bibliography
- Computer security -- Bibliography
- Computer security -- Case studies
- Computer security -- China
- Computer security -- China
- Computer security -- Computer programs
- Computer security -- Congresses
- Computer security -- Dictionaries
- Computer security -- Economic aspects -- United States
- Computer security -- Employees -- United States
- Computer security -- Employees | Training of
- Computer security -- Employees | Training of -- United States
- Computer security -- Employees | Training of -- United States
- Computer security -- European Union countries
- Computer security -- Evaluation
- Computer security -- Evaluation
- Computer security -- Evaluation | Methodology
- Computer security -- Examinations -- Study guides
- Computer security -- Fiction
- Computer security -- Fiction
- Computer security -- Forecasting
- Computer security -- Government policy
- Computer security -- Government policy
- Computer security -- Government policy -- United States
- Computer security -- Government policy -- United States
- Computer security -- Government policy -- United States -- Evaluation
- Computer security -- Government policy -- United States -- Evaluation
- Computer security -- Great Britain
- Computer security -- Handbooks, manuals, etc
- Computer security -- Illinois
- Computer security -- Information technology
- Computer security -- Insurance -- United States
- Computer security -- International cooperation
- Computer security -- International cooperation
- Computer security -- International cooperation
- Computer security -- Israel
- Computer security -- Juvenile literature
- Computer security -- Law and legislation
- Computer security -- Law and legislation
- Computer security -- Law and legislation -- China
- Computer security -- Law and legislation -- China
- Computer security -- Law and legislation -- Congresses
- Computer security -- Law and legislation -- Developing countries
- Computer security -- Law and legislation -- European Union countries
- Computer security -- Law and legislation -- Israel
- Computer security -- Law and legislation -- Periodicals
- Computer security -- Law and legislation -- United States
- Computer security -- Law and legislation -- United States
- Computer security -- Law and legislation -- United States -- Bibliography
- Computer security -- Law and legislation -- United States -- Evaluation
- Computer security -- Law and legislation -- United States -- States
- Computer security -- Law and legislation -- United States -- States
- Computer security -- Law and legislation | Economic aspects
- Computer security -- Law and legislation | United States
- Computer security -- Management
- Computer security -- Management
- Computer security -- Management -- Handbooks, manuals, etc
- Computer security -- Management | Examinations -- Study guides
- Computer security -- Management | Standards
- Computer security -- Mathematical models
- Computer security -- Mathematics
- Computer security -- Moral and ethical aspects
- Computer security -- Moral and ethical aspects -- United States -- Case studies
- Computer security -- New Mexico | Los Alamos
- Computer security -- New York (State)
- Computer security -- New York (State) | New York
- Computer security -- Periodicals
- Computer security -- Periodicals
- Computer security -- Psychological aspects
- Computer security -- Research -- United States
- Computer security -- Research -- United States
- Computer security -- Research -- United States -- Finance
- Computer security -- Research -- United States -- Finance
- Computer security -- Research | Government policy -- United States
- Computer security -- Russia (Federation)
- Computer security -- Scholarships, fellowships, etc -- United States
- Computer security -- Security measures
- Computer security -- Social aspects -- United States
- Computer security -- Social aspects -- United States -- Case studies
- Computer security -- Standards
- Computer security -- Standards
- Computer security -- Standards
- Computer security -- Standards -- United States
- Computer security -- Standards -- United States
- Computer security -- Study and teaching
- Computer security -- Study and teaching
- Computer security -- Study and teaching -- United States
- Computer security -- Study and teaching -- United States
- Computer security -- Study and teaching | Government policy -- United States
- Computer security -- Technological innovations -- United States
- Computer security -- Technological innovations -- United States
- Computer security -- Testing
- Computer security -- Testing -- Handbooks, manuals, etc
- Computer security -- Testing | Examinations -- Study guides
- Computer security -- Ukraine
- Computer security -- United States
- Computer security -- United States
- Computer security -- United States -- Bibliography
- Computer security -- United States -- Cases
- Computer security -- United States -- Employees | Recruiting
- Computer security -- United States -- Employees | Recruiting
- Computer security -- United States -- Employees | Recruiting | Government policy
- Computer security -- United States -- Encyclopedias
- Computer security -- United States -- Evaluation
- Computer security -- United States -- Evaluation
- Computer security -- United States -- Finance
- Computer security -- United States -- Finance
- Computer security -- United States -- Handbooks, manuals, etc
- Computer security -- United States -- Management
- Computer security -- United States -- Management
- Computer security -- United States -- Management -- Case studies
- Computer security -- United States -- Management | Evaluation
- Computer security -- United States -- Planning
- Computer security -- United States -- Planning
- Computer security -- United States -- Planning | Evaluation
- Computer security -- United States -- Planning | Evaluation
- Computer security -- United States -- Prevention | Law and legislation
- Computer security -- United States -- Public opinion
- Computer security -- United States -- States
- Computer security -- United States -- Statistics
- Computer security -- United States -- Testing | Evaluation
- Computer security -- Vocational guidance
- Computer security -- Washington (State) -- Evaluation
Subfocus of
No resources found
No enriched resources found
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/resource/bPm1x4xfNBs/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/resource/bPm1x4xfNBs/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Topic Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/resource/bPm1x4xfNBs/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/resource/bPm1x4xfNBs/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>