The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
1990, volume: 9, number: 5


  1. Random bits & bytes. [Citation Graph (, )][DBLP]


  2. Secure systems design - an evolving national strategy. [Citation Graph (, )][DBLP]


  3. East Germany - haven for software piracy. [Citation Graph (, )][DBLP]


  4. How many information security staff people should you have? [Citation Graph (, )][DBLP]


  5. The numbers game. [Citation Graph (, )][DBLP]


  6. The IPM model of computer virus management. [Citation Graph (, )][DBLP]


  7. Software evaluation in high integrity systems. [Citation Graph (, )][DBLP]


  8. A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems. [Citation Graph (, )][DBLP]


  9. Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002