Facet browsing currently unavailable
Page 10 of 7435 results
Sort by: relevance publication year
Code of practice: a standard for information security management JOURNAL ARTICLE published January 1997 in Computers & Security |
The new school paradigm: Metal detectors, roving patrols, firewalls, cyberwalls and encryption … JOURNAL ARTICLE published January 1999 in Computers & Security |
Enemy within poses a fraud risk JOURNAL ARTICLE published January 1999 in Computers & Security |
A comparison between java and activeX security JOURNAL ARTICLE published January 1997 in Computers & Security |
1999 CSI/FBI survey: Cyberattacks on the rise JOURNAL ARTICLE published January 1999 in Computers & Security |
It can't happen here JOURNAL ARTICLE published August 1988 in Computers & Security |
Prerequisites for data control JOURNAL ARTICLE published June 1989 in Computers & Security |
Pressure builds on chip thieves JOURNAL ARTICLE published January 1995 in Computers & Security |
Kahn on codes: Secrets of the new cryptology JOURNAL ARTICLE published September 1985 in Computers & Security |
Editorial Board JOURNAL ARTICLE published April 2020 in Computers & Security |
The one minute fraud auditor JOURNAL ARTICLE published February 1989 in Computers & Security |
Weigh in on encryption standard JOURNAL ARTICLE published January 1999 in Computers & Security |
Editorial Board JOURNAL ARTICLE published July 2019 in Computers & Security |
Guide for authors JOURNAL ARTICLE published May 2003 in Computers & Security |
Detecting network intruders JOURNAL ARTICLE published January 1997 in Computers & Security |
Discussing security with top management JOURNAL ARTICLE published April 1988 in Computers & Security |
International board of referees JOURNAL ARTICLE published January 1994 in Computers & Security |
IFIP technical committee 11 JOURNAL ARTICLE published December 1990 in Computers & Security |
A DOS-based POset implementation JOURNAL ARTICLE published October 1991 in Computers & Security |
Protecting The Web Server And Applications JOURNAL ARTICLE published January 2001 in Computers & Security |