Listing 1 - 5 of 5 |
Sort by
|
Choose an application
681.3*E3 --- Computer security. --- Computer networks --- Business enterprises --- Computer security --- -Business enterprises --- -005.8 --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security measures. --- Security measures --- -Security measures --- Distributed processing --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 005.8 --- Computer networks&delete&
Choose an application
Computer security --- Hackers --- Computer viruses --- Standards. --- Prevention.
Choose an application
Choose an application
Computer viruses continue to pose a threat to the integrity and availability of computer systems. This is especially true for users of personal computers. A variety of anti-virus tools are now available to help manage this threat. These tools use a wide range of techniques to detect, identify, and remove viruses. This guide provides criteria for judging the functionality, practicality, and convenience of anti-virus tools. It furnishes information which readers can use to determine which tools are best suited to target environments, but it does not weigh the merits of specific tools.
Availability --- Change detection --- Integrity --- Personal computer --- Precise identification --- Scanners --- System monitor --- Virus --- Virus removal
Choose an application
Listing 1 - 5 of 5 |
Sort by
|