Referencias Analíticas
*
Trusted Recovery
Jajodia, Sushil
; McCollum, Catherine D.
; Ammann, Paul
pp.71-75; 28cm; il
|
*
The Recodable Locking Device
Plummer, David W
; Dalton, Larry J.
; Peter, Frank J.
pp.83-87; 28cm; il.
|
*
The Need for Speed.
Tilley, Scott
pp.23-26.; 28cm.; il.
|
*
The Jini Architecture For Network-centric Computing
Waldo, Jim.
pp.76-82; 28cm; il.
|
*
The Dark Side of Employee Email.
Sipior, Janice C
; Ward, Burke T.
pp.88-95; 28cm; il.
|
*
Testing and Evaluating Computer Intrusion Detection Systems
Durst, Robert
; Champion, Terrence
; Witten, Brian
; Miller, Eric
; Spagnuolo, Luigi
pp.53-61; 28cm; il.
|
*
Telecom Act, Scene One.
McGinity, Meg
pp.15-18.; 28cm.; il.
|
*
Intrusion Detection For Distributed Applications
Stillerman, Matthew
; Marceau, Carla
; Stillman, Maureen
pp.62-69; 28cm; il
|
*
Inoculating Software For Survivabilit
Ghosh, Anup K
; Voas, Jeffrey M
pp.38-45; 28cm; il.
|
*
Infowar: AK-47s, Lies, and Videotape.
Munro, Neil
pp.19-22.; 28cm.; il.
|
*
Information is a Double-Edged Sword
Neumann , Peter G..
pp.120; 28cm; il
|
*
High-Confidence Design For Security
Shiu-Kai , Chin
pp.33-37; 28cm; il.
|
*
Communications of the ACM
Panda, Brajendra
; Giordano, Joseph
pp.30-32; 28cm; il.
|
*
A Cop On The Beat Collecting and Appraising Intrusionevidence
Goan, Terrance
pp.46-52; 28cm; il.
|
*
A Case Of Academic Plagiarism
Kock , Ned.
pp.96-104; 28cm; il.
|
|