Search the dblp DataBase
Donn B. Parker :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Donn B. Parker Computer and Data Abuse. [Citation Graph (0, 0)][DBLP ] ACM Pacific, 1975, pp:185-187 [Conf ] Donn B. Parker Restating the Foundation of Information Security. [Citation Graph (0, 0)][DBLP ] SEC, 1992, pp:139-151 [Conf ] Peter J. Denning , Donn B. Parker , Susan H. Nycum , Willis H. Ware Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1984, v:27, n:4, pp:312-321 [Journal ] Donn B. Parker Rules of ethics in information processing. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1968, v:11, n:3, pp:198-201 [Journal ] Donn B. Parker Vulnerabilities of EFTs to Intentionally Caused Losses. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1979, v:22, n:12, pp:654-660 [Journal ] Donn B. Parker Risks of risk-based security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:3, pp:120- [Journal ] Donn B. Parker The strategic values of information security in business. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:7, pp:572-582 [Journal ] Making computers safer. [Citation Graph (, )][DBLP ] Computer abuse perpetrators and vulnerabilities of computer systems. [Citation Graph (, )][DBLP ] Certification of computing personnel: prospects and potential impact. [Citation Graph (, )][DBLP ] The Dark Side of Computing: SRI International and the Study of Computer Crime. [Citation Graph (, )][DBLP ] Search in 0.026secs, Finished in 0.026secs