|
Search the dblp DataBase
Belden Menkus:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Belden Menkus
How to begin dealing with computer security. [Citation Graph (0, 0)][DBLP] Computers & Security, 1991, v:10, n:3, pp:199-203 [Journal]
- Belden Menkus
"Control" is fundamental to successful information security. [Citation Graph (0, 0)][DBLP] Computers & Security, 1991, v:10, n:4, pp:293-297 [Journal]
- Belden Menkus
"Hackers": Know the adversary. [Citation Graph (0, 0)][DBLP] Computers & Security, 1991, v:10, n:5, pp:405-409 [Journal]
- Belden Menkus
A high rise building fire case study. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:1, pp:19-23 [Journal]
- Belden Menkus
Introduction to computer security. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:2, pp:121-127 [Journal]
- Belden Menkus
Concerns in computer security. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:3, pp:211-215 [Journal]
- Belden Menkus
The lessons of the Great Chicago flood of 1992. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:5, pp:417-420 [Journal]
- Belden Menkus
Understanding EDI security issues. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:6, pp:525-528 [Journal]
- Belden Menkus
Re-examining the Data Encryption Standard. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:8, pp:703-706 [Journal]
- Belden Menkus
The new importance of "business continuity" in data processing disaster recovery planning. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:2, pp:115-118 [Journal]
Why data communications are insecure. [Citation Graph (, )][DBLP]
The complexity of "long haul" data communication security. [Citation Graph (, )][DBLP]
How an "audit trail" aids in maintaining information integrity...as illustrated in retailing. [Citation Graph (, )][DBLP]
Understanding data communication security vulnerabilities. [Citation Graph (, )][DBLP]
Computer-related fire problems revisited. [Citation Graph (, )][DBLP]
The computer virus situation is not encouraging. [Citation Graph (, )][DBLP]
Physical security: Selecting an access control system. [Citation Graph (, )][DBLP]
It's time to rethink data processing fire protection. [Citation Graph (, )][DBLP]
The employee's role in protecting information assets. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|