Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 7415 results
Sort by: relevance publication year

IFIP technical committee 11

JOURNAL ARTICLE published January 1996 in Computers & Security

Guide for Authors.

JOURNAL ARTICLE published February 2009 in Computers & Security

EDI security and the internet

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Terry Dosdale

Securing third party connections

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Eugene Schultz

Security, technology, publishing, and ethics (Part I)

JOURNAL ARTICLE published November 2010 in Computers & Security

Authors: Eugene H. Spafford

EU-US data privacy dispute to continue

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Software pirates treasure Win 95

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Encryption: hot topic on the Hill

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Ben McClure

International agreement pees encryption at 64

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

Integrating information security in the development of telematic systems

JOURNAL ARTICLE published January 1997 in Computers & Security

Operating system is weak link in MVS security

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland

Author index for volume 17

JOURNAL ARTICLE published January 1999 in Computers & Security

Computer Security Centre to be set up

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Designing a cluster-based covert channel to evade disk investigation and forensics

JOURNAL ARTICLE published January 2011 in Computers & Security

Authors: Hassan Khan | Mobin Javed | Syed Ali Khayam | Fauzan Mirza

A multi-layer Criticality Assessment methodology based on interdependencies

JOURNAL ARTICLE published September 2010 in Computers & Security

Authors: Marianthi Theoharidou | Panayiotis Kotzanikolaou | Dimitris Gritzalis

Internet privacy law: a comparison between the United States and the European Union

JOURNAL ARTICLE published July 2004 in Computers & Security

Authors: David L. Baumer | Julia B. Earp | J.C. Poindexter

The case for one-time credentials

JOURNAL ARTICLE published September 2004 in Computers & Security

Authors: E. Eugene Schultz

Trinity v3, a DDoS Tool, Hits the Streets

JOURNAL ARTICLE published November 2000 in Computers & Security

Authors: Bill Hancock

Policy Groups

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Winfried E. Kühnhauser

Abstracts of recent articles and literature

JOURNAL ARTICLE published November 1991 in Computers & Security