The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2000, volume: 19, number: 3

  1. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:202-203 [Journal]
  2. Bill Hancock
    Network Warfare On The Rise. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:203-204 [Journal]
  3. Bill Hancock
    FBI Source Convicted of Hackin. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:204-205 [Journal]
  4. Bill Hancock
    Microsoft "Whistler" Release Posted to Internet. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:205-206 [Journal]
  5. Bill Hancock
    US Senate Passes Bill to Tighten Up Government Network. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:206-207 [Journal]
  6. Bill Hancock
    Cyberpatrol Reverse Engineering: Round 2. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:207-207 [Journal]
  7. Bill Hancock
    First Cybercrime Task Force City - Pittsburgh. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:208-208 [Journal]
  8. Bill Hancock
    US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:208-208 [Journal]
  9. Bill Hancock
    More on the January, 2000, NSA Computer Problems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:209-211 [Journal]
  10. Bill Hancock
    Another Insider Job on Wall Stree. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:211-212 [Journal]
  11. Bill Hancock
    Mexico's President Under Cyberattack - Again. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:211-211 [Journal]
  12. Bill Hancock
    USDOJ Goes Prime Time With Cybercrime Web Sit. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:212-213 [Journal]
  13. Bill Hancock
    FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:212-212 [Journal]
  14. Bill Hancock
    EU and US Reach Agreement on Privacy Issues. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:213-214 [Journal]
  15. Bill Hancock
    Warning from the US Government: Companies Get Secure or... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:214-215 [Journal]
  16. Bill Hancock
    China Relaxes Encryption Rules. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:215-215 [Journal]
  17. Bill Hancock
    French Card Forgery Note Could Work. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:216-216 [Journal]
  18. Bill Hancock
    US Law Enforcement Needs You! [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:216-217 [Journal]
  19. Bill Hancock
    UK Law Enforcement Bemoans Criminal Activities on Interne. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:217-218 [Journal]
  20. Bill Hancock
    Intel Creates New Plans for Notebook Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:218-218 [Journal]
  21. Bill Hancock
    Kevin Mitnick Gets His Day in Congres. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:218-219 [Journal]
  22. Bill Hancock
    Web Site Owners Seek Security People Apply Now! [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:219-220 [Journal]
  23. Bill Hancock
    Generation X Hackers? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:220-221 [Journal]
  24. Stephen Hinde
    Life Was Simple Then. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:222-229 [Journal]
  25. Richard Barber
    Implementing Public Key Infrastructures in a Dynamic Business Environment. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:230-233 [Journal]
  26. Thomas Finne
    Information Systems Risk Management: Key Concepts and Business Processes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:234-242 [Journal]
  27. Mariki M. Eloff, Sebastiaan H. von Solms
    Information Security Management: A Hierarchical Framework for Various Approaches. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:243-256 [Journal]
  28. Spyros Kokolakis, Evangelos A. Kiountouzis
    Achieving Interoperability in a Multiple-Security- Policies Environment. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:267-281 [Journal]
  29. Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic
    Generation of RSA Keys That Are Guaranteed to be Unique for Each User. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:3, pp:282-288 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002