AAAAAA

   
Results: 1-19 |

Table of contents of journal:

Results: 19

Authors: Fisch, EA White, GB
Citation: Ea. Fisch et Gb. White, Fundamentals of computer security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 1-9

Citation: Risk assessment and mitigation, SECURE COMPUTERS AND NETWORKS, 2000, pp. 11-22

Citation: Developing secure computer systems, SECURE COMPUTERS AND NETWORKS, 2000, pp. 23-34

Citation: Security models, SECURE COMPUTERS AND NETWORKS, 2000, pp. 35-52

Citation: User authentication, SECURE COMPUTERS AND NETWORKS, 2000, pp. 53-71

Citation: Access and information flow controls, SECURE COMPUTERS AND NETWORKS, 2000, pp. 73-87

Citation: Auditing and intrusion detection, SECURE COMPUTERS AND NETWORKS, 2000, pp. 89-114

Citation: Damage control and assessment, SECURE COMPUTERS AND NETWORKS, 2000, pp. 115-136

Citation: Database security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 137-149

Citation: Network security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 151-176

Citation: Secure Electronic Commerce, SECURE COMPUTERS AND NETWORKS, 2000, pp. 177-189

Citation: World Wide Web (WWW) security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 191-206

Citation: Firewalls, SECURE COMPUTERS AND NETWORKS, 2000, pp. 207-223

Citation: Cryptography, SECURE COMPUTERS AND NETWORKS, 2000, pp. 225-262

Citation: Malicious code, SECURE COMPUTERS AND NETWORKS, 2000, pp. 263-289

Citation: Security standards, SECURE COMPUTERS AND NETWORKS, 2000, pp. 291-310

Citation: Case studies, SECURE COMPUTERS AND NETWORKS, 2000, pp. 311-327

Citation: Information warfare, SECURE COMPUTERS AND NETWORKS, 2000, pp. 329-344

Citation: UNIX security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 345-359
Risultati: 1-19 |