Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 6 of 7440 results
Sort by: relevance publication year

International board of referees

JOURNAL ARTICLE published January 1996 in Computers & Security

Computer abuse and managerial response

JOURNAL ARTICLE published December 1987 in Computers & Security

Authors: HaroldJoseph Highland

Intranets: living in your own private internet

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Collinson

Author index for vol. 12

JOURNAL ARTICLE published February 1994 in Computers & Security

Managing security for outsourcing contracts

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: John Sherwood

Inadvertent disclosures of inventions in social media affecting patent rights

JOURNAL ARTICLE published January 2018 in Computers & Security

Authors: A. Vijayalakshmi Venugopal

IFC - Editorial Board

JOURNAL ARTICLE published October 2015 in Computers & Security

A security officer's workbench

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Lam For Kwok | Dennis Longley

Random bits & bytes

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Harold Joseph Highland

IFC - Editorial Board

JOURNAL ARTICLE published October 2006 in Computers & Security

Contingency planning for the millenium

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Stephen Hinde

Red book includes a metaphysical look at security

JOURNAL ARTICLE published June 1988 in Computers & Security

Authors: Esther H. Highland

Cryptographic key distribution and authentication protocols for secure group communication

JOURNAL ARTICLE published January 1996 in Computers & Security

International Board of Referees

JOURNAL ARTICLE published January 1995 in Computers & Security

IFC - Editorial Board

JOURNAL ARTICLE published May 2009 in Computers & Security

From the editor

JOURNAL ARTICLE published February 1989 in Computers & Security

Authors: Harold Joseph Highland

Computer user surveillance

JOURNAL ARTICLE published April 1988 in Computers & Security

The reduced Enigma

JOURNAL ARTICLE published October 2003 in Computers & Security

Authors: Harold Thimbleby

From the Editor

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Bill Hancock

The security challenges inherent in VoIP

JOURNAL ARTICLE published December 2007 in Computers & Security

Authors: D. Bradbury