Facet browsing currently unavailable
Page 10 of 7421 results
Sort by: relevance publication year
Internet users fret over spies' new role JOURNAL ARTICLE published January 1995 in Computers & Security |
Internet security incidents, a survey within Dutch organizations JOURNAL ARTICLE published January 1998 in Computers & Security |
Transborder data flows: access to the international on-line data-base market JOURNAL ARTICLE published September 1985 in Computers & Security |
Code of practice: a standard for information security management JOURNAL ARTICLE published January 1997 in Computers & Security |
The new school paradigm: Metal detectors, roving patrols, firewalls, cyberwalls and encryption … JOURNAL ARTICLE published January 1999 in Computers & Security |
Enemy within poses a fraud risk JOURNAL ARTICLE published January 1999 in Computers & Security |
A comparison between java and activeX security JOURNAL ARTICLE published January 1997 in Computers & Security |
1999 CSI/FBI survey: Cyberattacks on the rise JOURNAL ARTICLE published January 1999 in Computers & Security |
It can't happen here JOURNAL ARTICLE published August 1988 in Computers & Security |
Prerequisites for data control JOURNAL ARTICLE published June 1989 in Computers & Security |
Pressure builds on chip thieves JOURNAL ARTICLE published January 1995 in Computers & Security |
Kahn on codes: Secrets of the new cryptology JOURNAL ARTICLE published September 1985 in Computers & Security |
Editorial Board JOURNAL ARTICLE published April 2020 in Computers & Security |
The one minute fraud auditor JOURNAL ARTICLE published February 1989 in Computers & Security |
Weigh in on encryption standard JOURNAL ARTICLE published January 1999 in Computers & Security |
Editorial Board JOURNAL ARTICLE published July 2019 in Computers & Security |
Guide for authors JOURNAL ARTICLE published May 2003 in Computers & Security |
Detecting network intruders JOURNAL ARTICLE published January 1997 in Computers & Security |
Discussing security with top management JOURNAL ARTICLE published April 1988 in Computers & Security |
International board of referees JOURNAL ARTICLE published January 1994 in Computers & Security |