Works matching DE "PERSONAL computer security"
Results: 6
How to Secure Client Data.
- Published in:
- Journal of Financial Planning, 2009, p. 24
- By:
- Publication type:
- Article
Development of humming call system for blocking spam on a smartphone.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 16, p. 17371, doi. 10.1007/s11042-017-4511-6
- By:
- Publication type:
- Article
Protecting the Internet Without Wrecking It: We need to develop a socially embedded online experience.
- Published in:
- Boston Review, 2008, v. 33, n. 2, p. 18
- By:
- Publication type:
- Article
Protecting the Internet Without Wrecking It: In the eyes of many existing institutions, security isn't a problem—it's an opportunity.
- Published in:
- Boston Review, 2008, v. 33, n. 2, p. 17
- By:
- Publication type:
- Article
Protecting the Internet Without Wrecking It: As long as flexibility has value to users, suppliers will have incentives to offer it.
- Published in:
- Boston Review, 2008, v. 33, n. 2, p. 14
- By:
- Publication type:
- Article
Continuous and Transparent User Identity Verification for Secure Internet Services.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 3, p. 270, doi. 10.1109/TDSC.2013.2297709
- By:
- Publication type:
- Article