AAAAAA

   
Results: 1-25 | 26-50 | 51-75 | 76-100 | >>

Table of contents of journal: *Computers and security

Results: 76-100/909

Authors: Hancock, B
Citation: B. Hancock, Law suits for cyber damages increasing, COMPUT SEC, 20(4), 2001, pp. 289-290

Authors: Hancock, B
Citation: B. Hancock, Freaking out in Las Vegas, COMPUT SEC, 20(4), 2001, pp. 290-294

Authors: Hinde, S
Citation: S. Hinde, The weakest link, COMPUT SEC, 20(4), 2001, pp. 295-301

Authors: Kovacich, GL
Citation: Gl. Kovacich, Information assurance: Surviving in the information environment - The Corporate Information Assurance Officer (CIAO), COMPUT SEC, 20(4), 2001, pp. 302-307

Authors: von Solms, B von Solms, R
Citation: B. Von Solms et R. Von Solms, Incremental information security certification, COMPUT SEC, 20(4), 2001, pp. 308-310

Authors: Pounder, C
Citation: C. Pounder, Cyber crime: the backdrop to the Council of Europe Convention, COMPUT SEC, 20(4), 2001, pp. 311-315

Authors: Zenkin, D
Citation: D. Zenkin, Fighting against the invisible enemy - Methods for detecting an unknown virus, COMPUT SEC, 20(4), 2001, pp. 316-321

Authors: Reid, RC Floyd, SA
Citation: Rc. Reid et Sa. Floyd, Extending the risk analysis model to include market-insurance, COMPUT SEC, 20(4), 2001, pp. 331-339

Authors: Hancock, B
Citation: B. Hancock, Untitled, COMPUT SEC, 20(3), 2001, pp. 186-187

Authors: Hancock, B
Citation: B. Hancock, Social engineering still popular: Verisign loses Microsoft certs, COMPUT SEC, 20(3), 2001, pp. 188-190

Authors: Hancock, B
Citation: B. Hancock, Worms are the latest rage with hacking efforts, COMPUT SEC, 20(3), 2001, pp. 190-191

Authors: Hancock, B
Citation: B. Hancock, GTE employee admits guilty in insider data corruption case, COMPUT SEC, 20(3), 2001, pp. 190-190

Authors: Hancock, B
Citation: B. Hancock, Security trade shows are getting out of hand, COMPUT SEC, 20(3), 2001, pp. 191-192

Authors: Hancock, B
Citation: B. Hancock, British government increases focus on hacking concerns, COMPUT SEC, 20(3), 2001, pp. 192-192

Authors: Hancock, B
Citation: B. Hancock, The US government and religion square off on airwave allocation, COMPUT SEC, 20(3), 2001, pp. 193-195

Authors: Hancock, B
Citation: B. Hancock, Partnership creates healthcare security concerns, COMPUT SEC, 20(3), 2001, pp. 195-196

Authors: Hancock, B
Citation: B. Hancock, Outlook 2002: Kill attachments to increase security, COMPUT SEC, 20(3), 2001, pp. 196-198

Authors: Hancock, B
Citation: B. Hancock, US government sources disclose 155 hacking successes, COMPUT SEC, 20(3), 2001, pp. 198-199

Authors: Hancock, B
Citation: B. Hancock, Wireless vulnerabilities continue to mount, COMPUT SEC, 20(3), 2001, pp. 199-200

Authors: Hancock, B
Citation: B. Hancock, Polymorphic code threatens sites, COMPUT SEC, 20(3), 2001, pp. 200-201

Authors: Hinde, S
Citation: S. Hinde, The times they are a-changin', COMPUT SEC, 20(3), 2001, pp. 202-206

Authors: Kovacich, GL
Citation: Gl. Kovacich, Protecting 21(st) century information - It's time for a change, COMPUT SEC, 20(3), 2001, pp. 207-213

Authors: von Solms, B
Citation: B. Von Solms, Corporate governance and information security, COMPUT SEC, 20(3), 2001, pp. 215-218

Authors: Horrocks, I
Citation: I. Horrocks, Security training: Education for an emerging profession?, COMPUT SEC, 20(3), 2001, pp. 219-226

Authors: Carter, B
Citation: B. Carter, Securing your brand in Cyberspace, COMPUT SEC, 20(3), 2001, pp. 227-238
Risultati: 1-25 | 26-50 | 51-75 | 76-100 | >>