The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2000, volume: 19, number: 7

  1. Bill Hancock
    New Classes of Unix/Linux Attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:570-571 [Journal]
  2. Bill Hancock
    American Express Creates Disposable Credit Card Number. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:571-572 [Journal]
  3. Bill Hancock
    Microsoft Releases New IIS Security Tool. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:572-572 [Journal]
  4. Bill Hancock
    Baltimore Releases Security Developer Freeware. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:572-573 [Journal]
  5. Bill Hancock
    `Files Streams' Virus Infects in an Old and New Way. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:573-574 [Journal]
  6. Bill Hancock
    Trinity v3, a DDoS Tool, Hits the Streets. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:574-574 [Journal]
  7. Bill Hancock
    Hacker Insurance Now Part of the Business Risk Management Kit. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:574-575 [Journal]
  8. Bill Hancock
    Wireless Crazed? No Security For You! [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:575-577 [Journal]
  9. Bill Hancock
    White House Supporting Open Source Code. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:577-578 [Journal]
  10. Bill Hancock
    White House Security Summit Builds Towards a B2B Security Standard. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:578-579 [Journal]
  11. Bill Hancock
    Cellular Security Hazards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:579-579 [Journal]
  12. Bill Hancock
    UK Fuel Taxes Protestor Accused of Mass Hacking. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:580-580 [Journal]
  13. Bill Hancock
    US Government Board Setting Up Security Metrics. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:580-580 [Journal]
  14. Bill Hancock
    Privacy Group Wants `Web Bugs' Disclosures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:581-581 [Journal]
  15. Bill Hancock
    Site Spoofing Becomes More Popular. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:581-583 [Journal]
  16. Bill Hancock
    First PDA Virus Hits the Airwaves. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:583-584 [Journal]
  17. Stephen Hinde
    Do You Know Your Organization's Achilles Heel? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:585-590 [Journal]
  18. August Bequai
    Romancing The Internet And Management's Quagmire. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:591-595 [Journal]
  19. Julie D. Nosworthy
    A Practical Risk Analysis Approach: Managing BCM Risk. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:596-614 [Journal]
  20. Basie von Solms
    Information Security - The Third Wave? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:615-620 [Journal]
  21. Rachael Pond, John Podd, Julie Bunnell, Ron Henderson
    Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:7, pp:645-656 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002