Works about COMPUTER security


Results: 5000
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32

    Code is Murphy's law.

    Published in:
    International Review of Law, Computers & Technology, 2005, v. 19, n. 3, p. 317, doi. 10.1080/13600860500348481
    By:
    • Kleve, Pieter;
    • Mulder, RichardDe
    Publication type:
    Article
    33

    ‘Code’: Privacy's death or saviour?

    Published in:
    International Review of Law, Computers & Technology, 2005, v. 19, n. 3, p. 329, doi. 10.1080/13600860500348572
    By:
    • Leenes, Ronald;
    • Koops, Bert-Jaap
    Publication type:
    Article
    34
    35

    Foreword.

    Published in:
    International Review of Law, Computers & Technology, 2004, v. 18, n. 2, p. 147, doi. 10.1080/1360086042000223454
    By:
    • Asinari, María Verónica pérez
    Publication type:
    Article
    36
    37
    38

    COMPUTERS AND PRIVACY.

    Published in:
    SAM Advanced Management Journal (00360805), 1971, v. 36, n. 3, p. 8
    By:
    • Henderson, Robert P.
    Publication type:
    Article
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48

    Casual virtual private network.

    Published in:
    Computer Systems Science & Engineering, 2005, v. 20, n. 3, p. 185
    By:
    • Roman, Rodrigo;
    • Lopez, Javier;
    • Jianying Zhou
    Publication type:
    Article
    49
    50