AAAAAA

   
Results: 1-25 | 26-50 | 51-75 | 76-100 | >>

Table of contents of journal: *Computers and security

Results: 1-25/909

Authors: Hancock, B
Citation: B. Hancock, From the editor, COMPUT SEC, 20(7), 2001, pp. 544-545

Authors: Hancock, B
Citation: B. Hancock, Mafiaboy given very light sentence, COMPUT SEC, 20(7), 2001, pp. 546-547

Authors: Hancock, B
Citation: B. Hancock, The cyberspace terrorist hunt is on, COMPUT SEC, 20(7), 2001, pp. 547-548

Authors: Hancock, B
Citation: B. Hancock, Patriotic hacking?, COMPUT SEC, 20(7), 2001, pp. 548-549

Authors: Hancock, B
Citation: B. Hancock, Backup your site against terrorists, COMPUT SEC, 20(7), 2001, pp. 549-550

Authors: Hancock, B
Citation: B. Hancock, FBI undercover hacking operations, COMPUT SEC, 20(7), 2001, pp. 550-552

Authors: Hancock, B
Citation: B. Hancock, The Russian "Mafiya" scams US citizens, COMPUT SEC, 20(7), 2001, pp. 552-553

Authors: Hancock, B
Citation: B. Hancock, Cybertracking cyberterrorism, COMPUT SEC, 20(7), 2001, pp. 553-553

Authors: Hancock, B
Citation: B. Hancock, You can't destroy it all if there is a backup..., COMPUT SEC, 20(7), 2001, pp. 554-555

Authors: Hancock, B
Citation: B. Hancock, Encryption vs. the law. Again. < sigh >, COMPUT SEC, 20(7), 2001, pp. 555-556

Authors: Hancock, B
Citation: B. Hancock, Now, live on TV: Hacking your bank, COMPUT SEC, 20(7), 2001, pp. 556-557

Authors: Hancock, B
Citation: B. Hancock, Wireless networks are not secure - (Duh! - you think?), COMPUT SEC, 20(7), 2001, pp. 557-559

Authors: Hancock, B
Citation: B. Hancock, The y2k training grounds, COMPUT SEC, 20(7), 2001, pp. 559-560

Authors: Hinde, S
Citation: S. Hinde, Lessons learned, COMPUT SEC, 20(7), 2001, pp. 561-567

Authors: Hinde, S
Citation: S. Hinde, Incalculable potential for damage by cyber-terrorism, COMPUT SEC, 20(7), 2001, pp. 568-572

Authors: Pounder, C
Citation: C. Pounder, The European union proposal for a policy towards network and information security, COMPUT SEC, 20(7), 2001, pp. 573-576

Authors: Gerber, M von Solms, R
Citation: M. Gerber et R. Von Solms, From risk analysis to security requirements, COMPUT SEC, 20(7), 2001, pp. 577-584

Authors: Chadwick, DW Basden, A
Citation: Dw. Chadwick et A. Basden, Evaluating trust in a public key certification authority, COMPUT SEC, 20(7), 2001, pp. 592-611

Authors: Lin, CH
Citation: Ch. Lin, Hierarchical key assignment without public-key cryptography, COMPUT SEC, 20(7), 2001, pp. 612-619

Authors: Schultz, EE Proctor, RW Lien, MC Salvendy, G
Citation: Ee. Schultz et al., Usability and security an appraisal of usability issues in information security methods, COMPUT SEC, 20(7), 2001, pp. 620-634

Authors: Hancock, B
Citation: B. Hancock, From the editor, COMPUT SEC, 20(6), 2001, pp. 448-450

Authors: Hancock, B
Citation: B. Hancock, US DoD puts up blocks to Code Red, COMPUT SEC, 20(6), 2001, pp. 451-452

Citation: US Department of Commerce security lacking (Big surpise, yes?), COMPUT SEC, 20(6), 2001, pp. 452-453

Citation: Melissa virus author sentencing delayed, COMPUT SEC, 20(6), 2001, pp. 453-455

Citation: 802.11 wireless LANs encryption vulnerability, COMPUT SEC, 20(6), 2001, pp. 453-453
Risultati: 1-25 | 26-50 | 51-75 | 76-100 | >>