Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 7438 results
Sort by: relevance publication year

The Evolution of Intrusion Detection Systems — The Next Step

JOURNAL ARTICLE published April 2001 in Computers & Security

Authors: Richard Barber

NASA Hacker Pleads Guilty

JOURNAL ARTICLE published December 2000 in Computers & Security

Authors: Bill Hancock

Weak SNMP?

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Ben McClure

Data security in a relational database environment

JOURNAL ARTICLE published June 1986 in Computers & Security

Authors: R.F. van der Lans

IFIP Technical Committee

JOURNAL ARTICLE published September 2009 in Computers & Security

New thinking about information technology security

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Marshall D. Abrams | Michael V. Joyce

Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware

JOURNAL ARTICLE published December 2000 in Computers & Security

Authors: Bill Hancock

Win 95 security measures mollify users

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Collinson

Editorial: Special issue on trust in cyber, physical and social computing

JOURNAL ARTICLE published November 2014 in Computers & Security

Authors: Zheng Yan | Guojun Wang | Valtteri Niemi | Robert H. Deng

Romancing The Internet And Management’s Quagmire

JOURNAL ARTICLE published November 2000 in Computers & Security

Authors: August Bequai

Annotated bibliography on software maintenance

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: W.M. Osborne | R. Raigrodski

Security plans lag computer crime rate

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

An analysis of the statistical disclosure attack and receiver-bound cover

JOURNAL ARTICLE published November 2011 in Computers & Security

Authors: Nayantara Mallesh | Matthew Wright

Calling in confidence

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

A sensible approach to protecting your data

JOURNAL ARTICLE published June 1988 in Computers & Security

Authors: Esther H. Highland

Passwords could be past tense by 2002

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

Virus wars escalate

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

IFIP technical committee 11

JOURNAL ARTICLE published December 1989 in Computers & Security

Agencies fail to appreciate threat to data security

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland

Protect your e-mail

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson