Works matching DE "COMPUTER virus prevention"


Results: 67
    1

    Protecting your Computer from Viruses.

    Published in:
    TechTrends: Linking Research & Practice to Improve Learning, 2006, v. 50, n. 4, p. 3, doi. 10.1007/s11528-006-0003-7
    By:
    • Descy, Don
    Publication type:
    Article
    2

    Pushdown model checking for malware detection.

    Published in:
    International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 2, p. 147, doi. 10.1007/s10009-013-0290-1
    By:
    • Song, Fu;
    • Touili, Tayssir
    Publication type:
    Article
    3
    4
    5
    6

    Presence and commitment.

    Published in:
    ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 84
    By:
    • Leung, Teresa
    Publication type:
    Article
    7
    8
    9

    THE WATER COOLER.

    Published in:
    Asia Weekly, 2008, v. 2, n. 38, p. 22
    Publication type:
    Article
    10
    11

    how to stay connected.

    Published in:
    Strategic Finance, 2002, v. 84, n. 3, p. 32
    By:
    • Hickman, Thomas
    Publication type:
    Article
    12

    tools of the trade.

    Published in:
    Strategic Finance, 2002, v. 84, n. 2, p. 56
    Publication type:
    Article
    13
    14

    E-mail Essentials.

    Published in:
    Journal of the CPA Practitioner, 2010, v. 2, n. 3, p. 7
    By:
    • D'Accordo, Armando
    Publication type:
    Article
    15
    16
    17
    18
    19
    20
    21
    22

    Dealing with PC Problems.

    Published in:
    Teacher Librarian, 2013, v. 41, n. 2, p. 64
    By:
    • Goldsborough, Reid
    Publication type:
    Article
    23

    Are You a Pirate?

    Published in:
    Teacher Librarian, 2003, v. 30, n. 4, p. 46
    By:
    • Goldsborough, Reid
    Publication type:
    Article
    24
    25
    26
    27
    28
    29
    30
    31

    Time for Some Resolutions.

    Published in:
    Strategic Finance, 2007, v. 88, n. 7, p. 55
    By:
    • Castelluccio, Michael
    Publication type:
    Article
    32
    33
    34

    Friend or Foe?

    Published in:
    Internal Auditor, 2010, v. 67, n. 1, p. 22
    Publication type:
    Article
    35
    36
    37

    Analysis of Instant Messaging Group Worms.

    Published in:
    International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 103, doi. 10.1080/15501320802575278
    By:
    • Wang, Wei;
    • Xie, Ming;
    • Luo, Daisheng;
    • Fang, Yong
    Publication type:
    Article
    38
    39

    Wanted: cyber-czars.

    Published in:
    Nature, 2009, v. 458, n. 7241, p. 945, doi. 10.1038/458945a
    Publication type:
    Article
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50