Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 7419 results
Sort by: relevance publication year

Battling Mediocrity

JOURNAL ARTICLE published April 1988 in Computers & Security

45% of big firms monitor workers

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Bill Hancock

Random bits & bytes

JOURNAL ARTICLE published January 1994 in Computers & Security

Authors: HaroldJoseph Highland

Elite panel slams US crypto policy

JOURNAL ARTICLE published January 1996 in Computers & Security

Why access control is difficult

JOURNAL ARTICLE published August 2002 in Computers & Security

Authors: Steve Purser

Telecoms systems insecurity, exploitation, fraud

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

A comprehensive need-to-know access control system and its application for medical information systems

JOURNAL ARTICLE published January 1997 in Computers & Security

Windows NT security: Kudos, concerns, and prescriptions

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: E.Eugene Schultz

Calendar

JOURNAL ARTICLE published February 1993 in Computers & Security

Abstracts of recent articles and literature

JOURNAL ARTICLE published January 1994 in Computers & Security

Authors: Helen Collinson

Ticket and Challenge-Based Protocols for Timestamping

JOURNAL ARTICLE published October 2000 in Computers & Security

Authors: Mohammad Peyravian | Stephen M Matyas | Allen Roginsky | Nevenko Zunic

What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists

JOURNAL ARTICLE published March 2002 in Computers & Security

Authors: Gerald L. Kovacich | Andy Jones

IFIP technical committee 11

JOURNAL ARTICLE published September 2003 in Computers & Security

From The Editor

JOURNAL ARTICLE published February 2000 in Computers & Security

Authors: Bill Hancock

Computer insurance: The gaps

JOURNAL ARTICLE published June 1988 in Computers & Security

Authors: Esther H. Highland

IFIP TC 11 news

JOURNAL ARTICLE published June 1993 in Computers & Security

Authors: HaroldJoseph Highland

2001: A Privacy Odyssey

JOURNAL ARTICLE published January 2001 in Computers & Security

Authors: Stephen Hinde

Electronic mail—Is is safe to use?

JOURNAL ARTICLE published February 1991 in Computers & Security

Authors: Bernard Robertson

Security and credibility in an information-intensive society

JOURNAL ARTICLE published October 1990 in Computers & Security

Authors: John M. Carroll

Unclassified security calls for a ‘friendly’ approach

JOURNAL ARTICLE published February 1988 in Computers & Security

Authors: J.B. Miles