Facet browsing currently unavailable
Page 5 of 7415 results
Sort by: relevance publication year
IFIP TC11 news JOURNAL ARTICLE published January 1998 in Computers & Security |
Data encryption standard. 1975–January 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities Database) JOURNAL ARTICLE published October 1988 in Computers & Security |
The virtuous virus JOURNAL ARTICLE published December 1992 in Computers & Security |
Architectures for C2 DOS/Windows-based Personal Computers — Securing an ‘Undesirable’ Operating System JOURNAL ARTICLE published January 1995 in Computers & Security |
New member of the International Board of Editors JOURNAL ARTICLE published March 1985 in Computers & Security |
Mining meaningful and rare roles from web application usage patterns JOURNAL ARTICLE published May 2019 in Computers & Security |
Mining TCP/IP packets to detect stepping-stone intrusion JOURNAL ARTICLE published December 2007 in Computers & Security |
Calendar JOURNAL ARTICLE published January 1999 in Computers & Security |
Editorial Board JOURNAL ARTICLE published September 2019 in Computers & Security |
The burglar's viewpoint JOURNAL ARTICLE published November 1984 in Computers & Security |
Former high-tech thief warns of scams JOURNAL ARTICLE published January 1997 in Computers & Security |
Conference to address combating internet child pornography JOURNAL ARTICLE published January 1999 in Computers & Security |
IFIP technical committee 11 JOURNAL ARTICLE published January 1997 in Computers & Security |
Events JOURNAL ARTICLE published May 2003 in Computers & Security |
The charade of computer security JOURNAL ARTICLE published April 1987 in Computers & Security |
Guide for Authors. JOURNAL ARTICLE published November 2006 in Computers & Security |
For your eyes only JOURNAL ARTICLE published January 1999 in Computers & Security |
Random notes JOURNAL ARTICLE published December 1987 in Computers & Security |
The employee's role in protecting information assets JOURNAL ARTICLE published October 1989 in Computers & Security |
Security views JOURNAL ARTICLE published March 2004 in Computers & Security |