AAAAAA

   
Results: 1-25 | 26-50 | 51-52
Results: 1-25/52

Authors: KEILHOLZ U CONRADT C LEGHA SS KHAYAT D SCHEIBENBOGEN C THATCHER N GOEY SH GORE M DORVAL T HANCOCK B PUNT CJA DUMMER R AVRIL MF BROCKER EB BENHAMMOUDA A EGGERMONT AMM PRITSCH M
Citation: U. Keilholz et al., RESULTS OF INTERLEUKIN-2-BASED TREATMENT IN ADVANCED MELANOMA - A CASE RECORD-BASED ANALYSIS OF 631 PATIENTS, Journal of clinical oncology, 16(9), 1998, pp. 2921-2929

Authors: HANCOCK B
Citation: B. Hancock, FROM THE EDITOR, Computers & security, 17(7), 1998, pp. 562-563

Authors: HANCOCK B
Citation: B. Hancock, WINDOWS-98, RIP AND MY ADRENALINE RUSH, Computers & security, 17(7), 1998, pp. 564-565

Authors: HANCOCK B
Citation: B. Hancock, STEALTH PROBING OF INTERNET-CONNECTED SITES, Computers & security, 17(7), 1998, pp. 565-565

Authors: HANCOCK B
Citation: B. Hancock, LOTUS DOMINO SECURITY FLAWS REDUX, Computers & security, 17(7), 1998, pp. 565-566

Authors: HANCOCK B
Citation: B. Hancock, VENDOR-SUPPLIED SECURITY FOR COMPUTERS, Computers & security, 17(7), 1998, pp. 566-567

Authors: HANCOCK B
Citation: B. Hancock, EUROPEAN COMPANIES NOT IMPRESSED WITH E-COMMERCE, Computers & security, 17(7), 1998, pp. 566-566

Authors: HANCOCK B
Citation: B. Hancock, NETWORK ASSOCIATES INTRODUCES A NEW FIREWALL CONCEPT - ADAPTIVE PROXIES, Computers & security, 17(7), 1998, pp. 567-568

Authors: HANCOCK B
Citation: B. Hancock, NEW E-MAIL NEWSLETTER ON ELECTRONIC IDENTIFY FRAUD, Computers & security, 17(7), 1998, pp. 568-569

Authors: HANCOCK B
Citation: B. Hancock, AUSSIES OUTSOURCE THEIR EQUIVALENT OF THE US NATIONAL-SECURITY AGENCY, Computers & security, 17(7), 1998, pp. 568-568

Authors: HANCOCK B
Citation: B. Hancock, WORLDS SMALLEST COMBINATION LOCK IS CREATED, Computers & security, 17(7), 1998, pp. 569-569

Authors: HANCOCK B
Citation: B. Hancock, GETTING BITTEN BY YEAR-2000 PROBLEMS IN PLACES YOU NEVER THOUGHT OF, Computers & security, 17(7), 1998, pp. 569-574

Authors: HANCOCK B
Citation: B. Hancock, UNTITLED, Computers & security, 17(6), 1998, pp. 460-461

Authors: HANCOCK B
Citation: B. Hancock, SECURITY TRADESHOWS - GOOD OR BAD, Computers & security, 17(6), 1998, pp. 462-474

Authors: HANCOCK B
Citation: B. Hancock, FROM THE EDITOR, Computers & security, 17(5), 1998, pp. 368-369

Authors: HANCOCK B
Citation: B. Hancock, DES CRYPTO BROKEN - AGAIN, Computers & security, 17(5), 1998, pp. 370-372

Authors: HANCOCK B
Citation: B. Hancock, MACRO VIRUS POSTS DOCUMENTS TO INTERNET NEWS GROUPS, Computers & security, 17(5), 1998, pp. 372-373

Authors: HANCOCK B
Citation: B. Hancock, CORPORATE EDUCATION TRENDS - USE THE INTRANET, Computers & security, 17(5), 1998, pp. 373-374

Authors: HANCOCK B
Citation: B. Hancock, SECURITY PROFESSIONALS - EXPERIENCE PAYS, Computers & security, 17(5), 1998, pp. 374-374

Authors: HANCOCK B
Citation: B. Hancock, SOME COOKIES ARE NOT TASTY .., Computers & security, 17(5), 1998, pp. 374-376

Authors: HANCOCK B
Citation: B. Hancock, SECURITY BOOKS FOR SUMMER READING PLEASURE, Computers & security, 17(5), 1998, pp. 376-380

Authors: HANCOCK B
Citation: B. Hancock, UNTITLED, Computers & security, 17(4), 1998, pp. 278-279

Authors: HANCOCK B
Citation: B. Hancock, SECURITY VIEWS, Computers & security, 17(4), 1998, pp. 280-292

Authors: HANCOCK B
Citation: B. Hancock, FROM THE EDITOR, Computers & security, 17(3), 1998, pp. 190-191

Authors: HANCOCK B
Citation: B. Hancock, SECURITY VIEWS, Computers & security, 17(3), 1998, pp. 192-200
Risultati: 1-25 | 26-50 | 51-52