Referencias Analíticas
*
Trus (And Mistrut) in Secure Applications
Viega, Tadayoshi, John
; Kohno, Tadayoshi
; Potter, Bruce
pp.31-36.; 28cm.; il.
|
*
The Privacy Practices of Web Browser Extension
Smith, Richard M.
; Martin Jr., David M.
; Brittain, Michael
; Fetch, Ivan
; Wu, Hailin
pp.45-50.; 28cm.; il.
|
*
The Digital Dilemman
Randall, Davis
pp.77-83.; 28cm.; il.
|
*
The Collision of Tradermarks, Domain Names, and Due Process in Cyberspace
Froomkin, A. Michael
pp.91-97.; 28cm.; il.
|
*
The Battle Over the Institutional Ecosystem in the Digital Environment
Benkler, Yochai
pp.84-90.; 28cm.; il.
|
*
Staying Connected ( Name Is the Game)
McGinity, Meg
pp.21-23.; 28cm.; il
|
*
Software Security and Privacy Risks in Mobile E- Commerce
Ghosh, Anup K.
; Swaminatha, Tara M.2
pp.51-57.; 28cm.; il.
|
*
Security Models for Web-based Applications
B.D. Joshi, James
; Aref, Walid G.
; Ghafoor, Arif
; Spafford, Eugene H.
pp.38-44.; 28cm.; il.
|
*
Securing network software applications: introduction
Bashir, Imran
; Serafini , Enrico
; Wall , Kevin
pp.28-30.; 28cm.; il.
|
*
Is Virtual Trespass an Apt Analogy
O'Rourke, Maureen
pp.98-103.; 28cm.; il.
|
*
Intellectual property for an information age: introduction
Samuelson , Pamela
pp.66-68.; 28cm.; il.
|
*
Copyrightable functions and patentable speech
Burk, Dan L.
pp.69-75.; 28cm.; il.
|
*
An Operating Systems Approach to Securing E. Services
Dalton, Chris
; Choo, Tse Huong
pp.58-64.; 28cm.; il.
|
|