|
Journals in DBLP
- Bill Hancock
From the editor. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:3, pp:182-183 [Journal]
- Stephen Hinde
Are you in control? [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:3, pp:199-203 [Journal]
- E. Eugene Schultz
Windows NT security: Kudos, concerns, and prescriptions. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:3, pp:204-210 [Journal]
- Gerald L. Kovacich
I-way robbery: Crime on the internet. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:3, pp:211-220 [Journal]
- John Hughes
Certificate inter-operability - white paper. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:3, pp:221-230 [Journal]
- Vesselin Bontchev
The problems of wordmacro virus upconversion. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:3, pp:241-255 [Journal]
- Sebastiaan H. von Solms, J. H. S. Geldenhuys
Managing multi level security in a military intranet environment. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:3, pp:257-270 [Journal]
|