Windows of vulnerability: a case study analysis (English)
- New search for: Arbaugh, W.A.
- New search for: Fithen, W.L.
- New search for: McHugh, J.
- New search for: Arbaugh, W.A.
- New search for: Fithen, W.L.
- New search for: McHugh, J.
In:
Computer, Long Beach
;
33
, 12
;
52-59
;
2000
-
ISSN:
- Article (Journal) / Print
-
Title:Windows of vulnerability: a case study analysis
-
Contributors:
-
Published in:Computer, Long Beach ; 33, 12 ; 52-59
-
Publisher:
-
Publication date:2000
-
Size:8 Seiten, 12 Quellen
-
ISSN:
-
Coden:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 33, Issue 12
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 4
-
DEPARTMENTS - Letters| 2000
- 8
-
MEMBERSHIP NEWS - Report to Members| 2000
- 10
-
IEEE Computer Society Membership Application| 2000
- 13
-
NEWS - Industry Trends - Will PKI Become a Key to Online Security?Ortiz Jr, Sixto et al. | 2000
- 16
-
NEWS - Technology News - Malicious Code Moves to Mobile DevicesLeavitt, Neal et al. | 2000
- 20
-
NEWS - News Briefs - U.S. Picks New Encryption Standard . Better Software with Open Source? . Taking a SIP of Internet Telephony| 2000
- 24
-
DEPARTMENTS - Article Summaries| 2000
- 26
-
Reflections on 18 years of change at the computer societyElliott, T.M. / Darwin, C. et al. | 2000
- 26
-
SPECIAL FEATURES - Reflections on 18 Years of Change at the Computer SocietyElliott, T.Michael et al. | 2000
- 30
-
Graphical programming using UML and SDLBjorkander, M. et al. | 2000
- 30
-
COMPUTING PRACTICES - Graphical Programming Using UML and SDLBjörkander, Morgan et al. | 2000
- 36
-
PERSPECTIVES - Toward a More Reliable Theory of Software ReliabilityWhittaker, James A. et al. | 2000
- 36
-
Toward a more reliable theory of software reliabilityWhittaker, J.A. / Voas, J. et al. | 2000
- 43
-
COVER - Are We Forgetting the Risks of Information Technology?Longstaff, Thomas A. et al. | 2000
- 43
-
Are we forgetting the risks of information technology?Longstaff, T.A. / Chittister, C. / Pethia, R. / Haimes, Y.Y. et al. | 2000
- 52
-
Windows of vulnerability: a case study analysisArbaugh, W.A. / Fithen, W.L. / McHugh, J. et al. | 2000
- 52
-
COVER - Windows of Vulnerability: A Case Study AnalysisArbaugh, William A. et al. | 2000
- 60
-
A national-scale authentication infrastructureButler, R. / Welch, V. / Engert, D. / Foster, I. / Tuecke, S. / Volmer, J. / Kesselman, C. et al. | 2000
- 60
-
RESEARCH - A National-Scale Authentication InfrastructureButler, Randy et al. | 2000
- 67
-
Making pointer-based data structures cache consciousChilimbi, T.M. / Hill, M.D. / Larus, J.R. et al. | 2000
- 67
-
RESEARCH - Making Pointer-Based Data Structures Cache ConsciousChilimbi, Trishul M. et al. | 2000
- 76
-
Annual Index| 2000
- 92
-
MEMBERSHIP NEWS - Computer Society Connection - St. Petersburg State Professor Wins CiSE Educational Software Contest . Computer Recognizes Reviewers' Expertise . Merwin Scholarship Awarded to Four Students| 2000
- 96
-
MEMBERSHIP NEWS - Call and Calendar| 2000
- 100
-
Career Opportunities| 2000
- 144
-
DEPARTMENTS - Products| 2000
- 147
-
DEPARTMENTS - New Books| 2000
- 148
-
The emergence of m-commerceSenn, J.A. et al. | 2000
- 148
-
COLUMNS - Communications - The Emergence of M-CommerceSenn, James A. et al. | 2000
- 151
-
Advertiser-Product Index| 2000
- 152
-
COLUMNS - Standards - SCSI, the Industry Workhorse, Is Still Working HardMason, Harry et al. | 2000
- 152
-
SCSI, the industry workhorse, is still working hardMason, H. et al. | 2000
- 154
-
COLUMNS - Entertainment Computing - Computer Games' Influence on Scientific and Information VisualizationRhyne, Theresa-Marie et al. | 2000
- 154
-
Computer games' influence on scientific and information visualizationRhyne, T.-M. et al. | 2000
- 160
-
COLUMNS - The Profession - Why Johnny Can't ProgramHolmes, Neville et al. | 2000
- 160
-
Why Johnny can't program [computing professionals]Holmes, N. et al. | 2000