Facet browsing currently unavailable
Page 1 of 7416 results
Sort by: relevance publication year
Hacking and Penetration Testing with Low Power Devices JOURNAL ARTICLE published March 2015 in Computers & Security |
Evaluating the risks of computer fraud and error JOURNAL ARTICLE published June 1983 in Computers & Security |
Privacy and databases: A question of dignity JOURNAL ARTICLE published October 1988 in Computers & Security |
The case of the “Gerbil virus” that wasn't JOURNAL ARTICLE published October 1988 in Computers & Security |
Intranet security JOURNAL ARTICLE published January 1996 in Computers & Security |
Contents JOURNAL ARTICLE published September 2011 in Computers & Security |
IFC - Editorial Board JOURNAL ARTICLE published March 2010 in Computers & Security |
Contents JOURNAL ARTICLE published September 2010 in Computers & Security |
Experts: Use caution with white-hat hackers JOURNAL ARTICLE published January 1999 in Computers & Security |
Placement of data integrity security services in open systems interconnection architecture JOURNAL ARTICLE published October 1989 in Computers & Security |
IFIP Technical Committee 11 JOURNAL ARTICLE published October 2003 in Computers & Security |
Calendar JOURNAL ARTICLE published January 1999 in Computers & Security |
Suspect Charged in ‘Love Bug’ Worm has Charges Dropped JOURNAL ARTICLE published July 2000 in Computers & Security |
Abstracts of recent articles and literature JOURNAL ARTICLE published April 1990 in Computers & Security |
Summit addresses growth, security issues for internet JOURNAL ARTICLE published January 1995 in Computers & Security |
Compsec 98 International JOURNAL ARTICLE published January 1998 in Computers & Security |
Computer backup pools, disaster recovery, and default risk JOURNAL ARTICLE published June 1988 in Computers & Security |
Melissa mutates into copycat virus via RTF JOURNAL ARTICLE published January 1999 in Computers & Security |
Putting a stop to software piracy JOURNAL ARTICLE published September 1992 in Computers & Security |
Security research alliance begins JOURNAL ARTICLE published January 1999 in Computers & Security |