Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 7415 results
Sort by: relevance publication year

IFIP TC11 news

JOURNAL ARTICLE published January 1998 in Computers & Security

Data encryption standard. 1975–January 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities Database)

JOURNAL ARTICLE published October 1988 in Computers & Security

The virtuous virus

JOURNAL ARTICLE published December 1992 in Computers & Security

Architectures for C2 DOS/Windows-based Personal Computers — Securing an ‘Undesirable’ Operating System

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Harold Joseph Highland

New member of the International Board of Editors

JOURNAL ARTICLE published March 1985 in Computers & Security

Mining meaningful and rare roles from web application usage patterns

JOURNAL ARTICLE published May 2019 in Computers & Security

Authors: Nurit Gal-Oz | Yaron Gonen | Ehud Gudes

Mining TCP/IP packets to detect stepping-stone intrusion

JOURNAL ARTICLE published December 2007 in Computers & Security

Authors: Jianhua Yang | Shou-Hsuan Stephen Huang

Calendar

JOURNAL ARTICLE published January 1999 in Computers & Security

Editorial Board

JOURNAL ARTICLE published September 2019 in Computers & Security

The burglar's viewpoint

JOURNAL ARTICLE published November 1984 in Computers & Security

Authors: W.R.C. van Hoboken

Former high-tech thief warns of scams

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Ben McClure

Conference to address combating internet child pornography

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Bill Hancock

IFIP technical committee 11

JOURNAL ARTICLE published January 1997 in Computers & Security

Events

JOURNAL ARTICLE published May 2003 in Computers & Security

The charade of computer security

JOURNAL ARTICLE published April 1987 in Computers & Security

Authors: HaroldJoseph Highland

Guide for Authors.

JOURNAL ARTICLE published November 2006 in Computers & Security

For your eyes only

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Random notes

JOURNAL ARTICLE published December 1987 in Computers & Security

Authors: Harold Joseph Highland

The employee's role in protecting information assets

JOURNAL ARTICLE published October 1989 in Computers & Security

Authors: Belden Menkus

Security views

JOURNAL ARTICLE published March 2004 in Computers & Security