Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 7416 results
Sort by: relevance publication year

Internet tools for auditors

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Alan Oliphant

IFIP technical committee 11

JOURNAL ARTICLE published August 1989 in Computers & Security

IFIP technical committee 11

JOURNAL ARTICLE published September 1992 in Computers & Security

Addresses of publications

JOURNAL ARTICLE published August 1988 in Computers & Security

(iii) Contents

JOURNAL ARTICLE published March 2007 in Computers & Security

International board of referees

JOURNAL ARTICLE published January 1995 in Computers & Security

Securing your users' Web browsers

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

IFIP TCII - Aims, Scope and Technical Committee

JOURNAL ARTICLE published June 2011 in Computers & Security

Why the bad guys are winning

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Eugene Schultz

North didn't understand delete function

JOURNAL ARTICLE published February 1988 in Computers & Security

Authors: Evelyn C. McDonald

Banking on a secure Internet

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Ben McClure

Telecommunications fraud, the gory details

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Peter Hoath

From the editor

JOURNAL ARTICLE published October 1993 in Computers & Security

From the editor-in-chief

JOURNAL ARTICLE published April 2003 in Computers & Security

Wireless crime's inside story

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Ben McClure

A zero knowledge probabilistic login protocol

JOURNAL ARTICLE published December 1992 in Computers & Security

Authors: Dimitris Gritzalis | Sokratis Katsikas | Stefanos Gritzalis

Editorial

JOURNAL ARTICLE published September 1985 in Computers & Security

Authors: Harold Joseph Highland

Would you report a suspected data crime to the authorities?

JOURNAL ARTICLE published August 1987 in Computers & Security

Authors: Harold Joseph Highland

Windows Vista: Microsoft's brave new world

JOURNAL ARTICLE published March 2007 in Computers & Security

Authors: E. Eugene Schultz

Using network traffic analysis as a security tool

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Harold Joseph Highland