Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-25
|
26-50
|
51-75
|
76-100
|
>>
Table of contents of journal:
*Computers and security
Results: 1-25/909
From the editor
Authors:
Hancock, B
Citation:
B. Hancock, From the editor, COMPUT SEC, 20(7), 2001, pp. 544-545
Mafiaboy given very light sentence
Authors:
Hancock, B
Citation:
B. Hancock, Mafiaboy given very light sentence, COMPUT SEC, 20(7), 2001, pp. 546-547
The cyberspace terrorist hunt is on
Authors:
Hancock, B
Citation:
B. Hancock, The cyberspace terrorist hunt is on, COMPUT SEC, 20(7), 2001, pp. 547-548
Patriotic hacking?
Authors:
Hancock, B
Citation:
B. Hancock, Patriotic hacking?, COMPUT SEC, 20(7), 2001, pp. 548-549
Backup your site against terrorists
Authors:
Hancock, B
Citation:
B. Hancock, Backup your site against terrorists, COMPUT SEC, 20(7), 2001, pp. 549-550
FBI undercover hacking operations
Authors:
Hancock, B
Citation:
B. Hancock, FBI undercover hacking operations, COMPUT SEC, 20(7), 2001, pp. 550-552
The Russian "Mafiya" scams US citizens
Authors:
Hancock, B
Citation:
B. Hancock, The Russian "Mafiya" scams US citizens, COMPUT SEC, 20(7), 2001, pp. 552-553
Cybertracking cyberterrorism
Authors:
Hancock, B
Citation:
B. Hancock, Cybertracking cyberterrorism, COMPUT SEC, 20(7), 2001, pp. 553-553
You can't destroy it all if there is a backup...
Authors:
Hancock, B
Citation:
B. Hancock, You can't destroy it all if there is a backup..., COMPUT SEC, 20(7), 2001, pp. 554-555
Encryption vs. the law. Again. < sigh >
Authors:
Hancock, B
Citation:
B. Hancock, Encryption vs. the law. Again. < sigh >, COMPUT SEC, 20(7), 2001, pp. 555-556
Now, live on TV: Hacking your bank
Authors:
Hancock, B
Citation:
B. Hancock, Now, live on TV: Hacking your bank, COMPUT SEC, 20(7), 2001, pp. 556-557
Wireless networks are not secure - (Duh! - you think?)
Authors:
Hancock, B
Citation:
B. Hancock, Wireless networks are not secure - (Duh! - you think?), COMPUT SEC, 20(7), 2001, pp. 557-559
The y2k training grounds
Authors:
Hancock, B
Citation:
B. Hancock, The y2k training grounds, COMPUT SEC, 20(7), 2001, pp. 559-560
Lessons learned
Authors:
Hinde, S
Citation:
S. Hinde, Lessons learned, COMPUT SEC, 20(7), 2001, pp. 561-567
Incalculable potential for damage by cyber-terrorism
Authors:
Hinde, S
Citation:
S. Hinde, Incalculable potential for damage by cyber-terrorism, COMPUT SEC, 20(7), 2001, pp. 568-572
The European union proposal for a policy towards network and information security
Authors:
Pounder, C
Citation:
C. Pounder, The European union proposal for a policy towards network and information security, COMPUT SEC, 20(7), 2001, pp. 573-576
From risk analysis to security requirements
Authors:
Gerber, M von Solms, R
Citation:
M. Gerber et R. Von Solms, From risk analysis to security requirements, COMPUT SEC, 20(7), 2001, pp. 577-584
Evaluating trust in a public key certification authority
Authors:
Chadwick, DW Basden, A
Citation:
Dw. Chadwick et A. Basden, Evaluating trust in a public key certification authority, COMPUT SEC, 20(7), 2001, pp. 592-611
Hierarchical key assignment without public-key cryptography
Authors:
Lin, CH
Citation:
Ch. Lin, Hierarchical key assignment without public-key cryptography, COMPUT SEC, 20(7), 2001, pp. 612-619
Usability and security an appraisal of usability issues in information security methods
Authors:
Schultz, EE Proctor, RW Lien, MC Salvendy, G
Citation:
Ee. Schultz et al., Usability and security an appraisal of usability issues in information security methods, COMPUT SEC, 20(7), 2001, pp. 620-634
From the editor
Authors:
Hancock, B
Citation:
B. Hancock, From the editor, COMPUT SEC, 20(6), 2001, pp. 448-450
US DoD puts up blocks to Code Red
Authors:
Hancock, B
Citation:
B. Hancock, US DoD puts up blocks to Code Red, COMPUT SEC, 20(6), 2001, pp. 451-452
US Department of Commerce security lacking (Big surpise, yes?)
Citation:
US Department of Commerce security lacking (Big surpise, yes?), COMPUT SEC, 20(6), 2001, pp. 452-453
Melissa virus author sentencing delayed
Citation:
Melissa virus author sentencing delayed, COMPUT SEC, 20(6), 2001, pp. 453-455
802.11 wireless LANs encryption vulnerability
Citation:
802.11 wireless LANs encryption vulnerability, COMPUT SEC, 20(6), 2001, pp. 453-453
Risultati:
1-25
|
26-50
|
51-75
|
76-100
|
>>