The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
1997, volume: 16, number: 7


  1. From the editor. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:570-571 [Journal]
  2. Donn B. Parker
    The strategic values of information security in business. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:572-582 [Journal]
  3. Nigel Hickson
    Encryption policy - A UK perspective. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:583-589 [Journal]
  4. Chris Pounder
    First steps towards a european union policy on the securing of electronic communications. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:590-594 [Journal]
  5. Andy Jones
    Penetration testing and system audit - experience gained during the investigation of systems within the UK. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:595-602 [Journal]
  6. John Sherwood
    Managing security for outsourcing contracts. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:603-609 [Journal]
  7. Gerald L. Kovacich
    Information systems security metrics management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:610-618 [Journal]
  8. Julie Bunnell, John Podd, Ron Henderson, Renee Napier, James Kennedy-Moffat
    Cognitive, associative and conventional passwords: Recall and guessing rates. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:629-641 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002