Facet browsing currently unavailable
Page 5 of 7438 results
Sort by: relevance publication year
The Evolution of Intrusion Detection Systems — The Next Step JOURNAL ARTICLE published April 2001 in Computers & Security |
NASA Hacker Pleads Guilty JOURNAL ARTICLE published December 2000 in Computers & Security |
Weak SNMP? JOURNAL ARTICLE published January 1998 in Computers & Security |
Data security in a relational database environment JOURNAL ARTICLE published June 1986 in Computers & Security |
IFIP Technical Committee JOURNAL ARTICLE published September 2009 in Computers & Security |
New thinking about information technology security JOURNAL ARTICLE published January 1995 in Computers & Security |
Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware JOURNAL ARTICLE published December 2000 in Computers & Security |
Win 95 security measures mollify users JOURNAL ARTICLE published January 1996 in Computers & Security |
Editorial: Special issue on trust in cyber, physical and social computing JOURNAL ARTICLE published November 2014 in Computers & Security |
Romancing The Internet And Management’s Quagmire JOURNAL ARTICLE published November 2000 in Computers & Security |
Annotated bibliography on software maintenance JOURNAL ARTICLE published October 1988 in Computers & Security |
Security plans lag computer crime rate JOURNAL ARTICLE published January 1995 in Computers & Security |
An analysis of the statistical disclosure attack and receiver-bound cover JOURNAL ARTICLE published November 2011 in Computers & Security |
Calling in confidence JOURNAL ARTICLE published January 1995 in Computers & Security |
A sensible approach to protecting your data JOURNAL ARTICLE published June 1988 in Computers & Security |
Passwords could be past tense by 2002 JOURNAL ARTICLE published January 1999 in Computers & Security |
Virus wars escalate JOURNAL ARTICLE published January 1995 in Computers & Security |
IFIP technical committee 11 JOURNAL ARTICLE published December 1989 in Computers & Security |
Agencies fail to appreciate threat to data security JOURNAL ARTICLE published August 1988 in Computers & Security |
Protect your e-mail JOURNAL ARTICLE published January 1995 in Computers & Security |