Facet browsing currently unavailable
Page 1 of 7430 results
Sort by: relevance publication year
Battling Mediocrity JOURNAL ARTICLE published April 1988 in Computers & Security |
45% of big firms monitor workers JOURNAL ARTICLE published January 1999 in Computers & Security |
Random bits & bytes JOURNAL ARTICLE published January 1994 in Computers & Security |
Elite panel slams US crypto policy JOURNAL ARTICLE published January 1996 in Computers & Security |
Why access control is difficult JOURNAL ARTICLE published August 2002 in Computers & Security |
Telecoms systems insecurity, exploitation, fraud JOURNAL ARTICLE published January 1997 in Computers & Security |
A comprehensive need-to-know access control system and its application for medical information systems JOURNAL ARTICLE published January 1997 in Computers & Security |
Windows NT security: Kudos, concerns, and prescriptions JOURNAL ARTICLE published January 1999 in Computers & Security |
Calendar JOURNAL ARTICLE published February 1993 in Computers & Security |
Abstracts of recent articles and literature JOURNAL ARTICLE published January 1994 in Computers & Security |
Ticket and Challenge-Based Protocols for Timestamping JOURNAL ARTICLE published October 2000 in Computers & Security |
What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists JOURNAL ARTICLE published March 2002 in Computers & Security |
IFIP technical committee 11 JOURNAL ARTICLE published September 2003 in Computers & Security |
From The Editor JOURNAL ARTICLE published February 2000 in Computers & Security |
Computer insurance: The gaps JOURNAL ARTICLE published June 1988 in Computers & Security |
IFIP TC 11 news JOURNAL ARTICLE published June 1993 in Computers & Security |
2001: A Privacy Odyssey JOURNAL ARTICLE published January 2001 in Computers & Security |
Electronic mail—Is is safe to use? JOURNAL ARTICLE published February 1991 in Computers & Security |
Security and credibility in an information-intensive society JOURNAL ARTICLE published October 1990 in Computers & Security |
Unclassified security calls for a ‘friendly’ approach JOURNAL ARTICLE published February 1988 in Computers & Security |