Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 7421 results
Sort by: relevance publication year

It can't happen here

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland

Prerequisites for data control

JOURNAL ARTICLE published June 1989 in Computers & Security

Authors: Kor IJ. Mollema | Ad P.M. Smulders

Pressure builds on chip thieves

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Kahn on codes: Secrets of the new cryptology

JOURNAL ARTICLE published September 1985 in Computers & Security

Editorial Board

JOURNAL ARTICLE published April 2020 in Computers & Security

The one minute fraud auditor

JOURNAL ARTICLE published February 1989 in Computers & Security

Authors: Jack Bologna

Weigh in on encryption standard

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Editorial Board

JOURNAL ARTICLE published July 2019 in Computers & Security

Guide for authors

JOURNAL ARTICLE published May 2003 in Computers & Security

Detecting network intruders

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

Discussing security with top management

JOURNAL ARTICLE published April 1988 in Computers & Security

Authors: William A.J. Bound

International board of referees

JOURNAL ARTICLE published January 1994 in Computers & Security

IFIP technical committee 11

JOURNAL ARTICLE published December 1990 in Computers & Security

A DOS-based POset implementation

JOURNAL ARTICLE published October 1991 in Computers & Security

Authors: Frederick B. Cohen

Protecting The Web Server And Applications

JOURNAL ARTICLE published January 2001 in Computers & Security

Authors: Iain Franklin

Hardware, software security devices protect PCs and inside information

JOURNAL ARTICLE published April 1988 in Computers & Security

In brief

JOURNAL ARTICLE published October 2002 in Computers & Security

Authors: Brian McKenna | Sarah Hilley

Protection of information in electronic systems

JOURNAL ARTICLE published December 1986 in Computers & Security

Securing peer-assisted indoor localization leveraging acoustic ranging

JOURNAL ARTICLE published March 2019 in Computers & Security

Research funded by National Natural Science Foundation of China (61425024,61402223,61321491,61300235)

Authors: Shaoyong Du | Jingyu Hua | Sheng Zhong

Security views

JOURNAL ARTICLE published September 2005 in Computers & Security

Authors: E. Schultz