Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 7416 results
Sort by: relevance publication year

Hacking and Penetration Testing with Low Power Devices

JOURNAL ARTICLE published March 2015 in Computers & Security

Authors: George Stergiopoulos | Dimitris Gritzalis

Evaluating the risks of computer fraud and error

JOURNAL ARTICLE published June 1983 in Computers & Security

Authors: Andrew D. Warren

Privacy and databases: A question of dignity

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: Mary Karen Dahl

The case of the “Gerbil virus” that wasn't

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: Raymond M. Glath

Intranet security

JOURNAL ARTICLE published January 1996 in Computers & Security

Contents

JOURNAL ARTICLE published September 2011 in Computers & Security

IFC - Editorial Board

JOURNAL ARTICLE published March 2010 in Computers & Security

Contents

JOURNAL ARTICLE published September 2010 in Computers & Security

Experts: Use caution with white-hat hackers

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Bill Hancock

Placement of data integrity security services in open systems interconnection architecture

JOURNAL ARTICLE published October 1989 in Computers & Security

Authors: Raju Ramaswamy

IFIP Technical Committee 11

JOURNAL ARTICLE published October 2003 in Computers & Security

Calendar

JOURNAL ARTICLE published January 1999 in Computers & Security

Suspect Charged in ‘Love Bug’ Worm has Charges Dropped

JOURNAL ARTICLE published July 2000 in Computers & Security

Authors: Bill Hancock

Abstracts of recent articles and literature

JOURNAL ARTICLE published April 1990 in Computers & Security

Summit addresses growth, security issues for internet

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Compsec 98 International

JOURNAL ARTICLE published January 1998 in Computers & Security

Computer backup pools, disaster recovery, and default risk

JOURNAL ARTICLE published June 1988 in Computers & Security

Authors: Esther H. Highland

Melissa mutates into copycat virus via RTF

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Putting a stop to software piracy

JOURNAL ARTICLE published September 1992 in Computers & Security

Authors: Lucia Withers

Security research alliance begins

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Bill Hancock