Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 7432 results
Sort by: relevance publication year

Transborder data flows: access to the international on-line data-base market

JOURNAL ARTICLE published September 1985 in Computers & Security

Code of practice: a standard for information security management

JOURNAL ARTICLE published January 1997 in Computers & Security

The new school paradigm: Metal detectors, roving patrols, firewalls, cyberwalls and encryption …

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Bill Hancock

Enemy within poses a fraud risk

JOURNAL ARTICLE published January 1999 in Computers & Security

A comparison between java and activeX security

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: David Hopwood

1999 CSI/FBI survey: Cyberattacks on the rise

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Bill Hancock

It can't happen here

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland

Prerequisites for data control

JOURNAL ARTICLE published June 1989 in Computers & Security

Authors: Kor IJ. Mollema | Ad P.M. Smulders

Pressure builds on chip thieves

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Kahn on codes: Secrets of the new cryptology

JOURNAL ARTICLE published September 1985 in Computers & Security

Editorial Board

JOURNAL ARTICLE published April 2020 in Computers & Security

The one minute fraud auditor

JOURNAL ARTICLE published February 1989 in Computers & Security

Authors: Jack Bologna

Weigh in on encryption standard

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Editorial Board

JOURNAL ARTICLE published July 2019 in Computers & Security

Guide for authors

JOURNAL ARTICLE published May 2003 in Computers & Security

Detecting network intruders

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

Discussing security with top management

JOURNAL ARTICLE published April 1988 in Computers & Security

Authors: William A.J. Bound

International board of referees

JOURNAL ARTICLE published January 1994 in Computers & Security

IFIP technical committee 11

JOURNAL ARTICLE published December 1990 in Computers & Security

A DOS-based POset implementation

JOURNAL ARTICLE published October 1991 in Computers & Security

Authors: Frederick B. Cohen