Works matching DE "COMPUTER security management"


Results: 119
    1

    SCALING DOWN SECURITY.

    Published in:
    Government Technology, 2016, v. 29, n. 7, p. 36
    By:
    • KOPOCHINSKI, LISA
    Publication type:
    Article
    2
    3

    Cyber Exposure.

    Published in:
    Government Technology, 2016, v. 29, n. 7, p. 24
    By:
    • Lemos, Robert
    Publication type:
    Article
    4

    Massive Connectedness.

    Published in:
    Government Technology, 2016, v. 29, n. 7, p. 18
    By:
    • STONE, ADAM
    Publication type:
    Article
    5

    Holding Steady at No. 1.

    Published in:
    Government Technology, 2016, v. 29, n. 7, p. 5
    By:
    • Knell, Noelle
    Publication type:
    Article
    6
    7
    8

    Pushdown model checking for malware detection.

    Published in:
    International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 2, p. 147, doi. 10.1007/s10009-013-0290-1
    By:
    • Song, Fu;
    • Touili, Tayssir
    Publication type:
    Article
    9
    10
    11

    Binary bugs.

    Published in:
    2013
    By:
    • Blenkharn, Ian
    Publication type:
    Opinion
    12

    How to Create Memorizable and Strong Passwords.

    Published in:
    Journal of Medical Internet Research, 2012, v. 14, n. 1, p. 33, doi. 10.2196/jmir.1906
    By:
    • Cipresso, Pietro;
    • Gaggioli, Andrea;
    • Serino, Silvia;
    • Cipresso, Sergio;
    • Riva, Giuseppe
    Publication type:
    Article
    13

    The psychological effects of cyber terrorism.

    Published in:
    Bulletin of the Atomic Scientists, 2016, v. 72, n. 5, p. 284, doi. 10.1080/00963402.2016.1216502
    By:
    • Gross, Michael L.;
    • Canetti, Daphna;
    • Vashdi, Dana R.
    Publication type:
    Article
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28

    PROTECTING SENSOR DATA FROM MALWARE ATTACKS.

    Published in:
    Intel Technology Journal, 2014, v. 18, n. 4, p. 178
    By:
    • Edwards, Jonathan;
    • Grewal, Ken;
    • LeMay, Michael;
    • Robinson, Scott H.;
    • Sahita, Ravi;
    • Woodward, Carl
    Publication type:
    Article
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40

    IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD.

    Published in:
    International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 837, doi. 10.26483/ijarcs.v8i7.4505
    By:
    • Pandey, Vimmi;
    • Dubey, Mridula
    Publication type:
    Article
    41
    42
    43

    how to stay connected.

    Published in:
    Strategic Finance, 2002, v. 84, n. 3, p. 32
    By:
    • Hickman, Thomas
    Publication type:
    Article
    44
    45
    46
    47
    48
    49
    50