Abstracts of recent articles and literature (English)
In:
Computers & security
;
13
, 3
; 221-225
;
1994
-
ISSN:
- Article (Journal) / Print
-
Title:Abstracts of recent articles and literature
-
Published in:Computers & security ; 13, 3 ; 221-225
-
Publisher:
- New search for: Elsevier
-
Place of publication:Kidlington, Oxford
-
Publication date:1994
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 13, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 190
-
From the editor| 1994
- 192
-
How Secure is Data Over the Internet?| 1994
- 192
-
Random bits & bytesFICS Highland,, HaroldJoseph et al. | 1994
- 192
-
Books About the Internet| 1994
- 192
-
What is Internet?| 1994
- 192
-
Network Security| 1994
- 192
-
Who Owns and Controls the Internet?| 1994
- 192
-
Searching for Information| 1994
- 192
-
The Internet and Computer Security| 1994
- 206
-
What do we mean by integrity?Courtney, Robert H. / Ware, Willis H. et al. | 1994
- 209
-
Fifty ways to secure dial-up connectionsWood, Charles Cresson et al. | 1994
- 217
-
Book ReviewsZajac, Bernard et al. | 1994
- 217
-
Applied cryptography: Protocols, algorithms, and source code in CZajac, Bernard P. Jr. et al. | 1994
- 218
-
Information security policies made easyZajac, Bernard P. Jr. et al. | 1994
- 218
-
Commonsense computer security — Your practical guide to information protection - 2nd editionZajac, Bernard P. Jr. et al. | 1994
- 221
-
Abstracts of recent articles and literatureCollinson, Helen et al. | 1994
- 226
-
Calendar of forthcoming conference and events| 1994
- 226
-
Calendar| 1994
- 229
-
International board of referees| 1994
- 231
-
Identity authentication in heterogeneous computing environments: a comparative study for an integrated frameworkKanungo, Shivraj et al. | 1994
- 255
-
A scheme to determine the relationship between two users in a hierarchyChang, C.C. / Jan, J.K. / Buehrer, D.J. et al. | 1994
- 263
-
High-level language computer viruses— a new threat?Magruder, Scott et al. | 1994
- 270
-
IFIP technical committee 11| 1994
- 274
-
Guide for authors| 1994