Inicio Nosotros Búsquedas
Buscar en nuestra Base de Datos:     
Registro 1 de 1, Base de información BIBCYT Communications of the ACM ISSN:0001-0782
June 2006

Referencias Analíticas

* Wireless Hotspot: Petri Dish Of Wireless Security Potter, Bruce pp. 51-56

* The Learning Edge. Armour, Phillip G. pp. 19-22

* The Application of MODEL CHECKING for SECURING E-COMMERCE TRANSACTIONS Brinton Anderson, Bonnie ; Hansen, James V. ; Lowry, Paul Benjamin ; Summers, Scott L. pp. 97-101

* Software Security Is Software Reliability Lindner, Felix pp. 57-61

* Security Through Legality Bono, Stephen ; Rubin, Aviel ; Stubblefield, Adam ; Green, Matthew pp. 41-43

* Research Lessons From Hardware Hacking. Grand, Joe pp. 44-48

* RECIPROCITY: THE GOLDEN RULE of IS-User Service Relationship Quality and Cooperation. Carr, Christopher L. pp. 77-83

* Plagiarism on the Rise Boisvert, Ronald F. ; Irwin, Mary Jane pp. 23-24

* Piracy, Computer Crime, And Is Misuse At The University. Cronan, Timothy Paul ; Jones, Thomas W. ; Foltz, C., Bryan pp.85-90

* My Aim Is To Close The Gap Between The Communities Of Computer Professionals And Computer Hacking. Conti, Gregory pp. 34-36

* Global Software Piracy: Can Economic Factors Alone Explain The Trend? Bagchi, Kallol ; Kirs, Peeter ; Cerveny, Robert pp. 70-75

* Farewell Address: The Growing and Graying of ACM. Patterson, David A. pp. 15-18

* Explorations In Namespace: White-Hat Hacking Across The Domain Name System. Kaminsky, Dan pp. 62-68

* ENTERPRISE INTEGRATION: Across the Globally Disbursed Service Organization. Shore, Barry pp. 102-106

* EHRs: Electronic Health Records or Exceptional Hidden Risks? Charette, Robert pp. 120-120

* Copyrighting Standards. Samuelson, Pamela pp. 27-31

* Academic Freedom And The Hacker Ethic. Cross, Tom pp. 37-40

* A Systematic Approach In Managing Post-Deployment System Changes. Kang, David ; Chiang, Roger pp. 91-95

* A Simple Approach to Improving Email Communication. Jackson, Thomas ; Burgess, Anthony ; Edwards, Janet pp. 107-109

* A Brief History Of Hardware Hacking. Grand, Joe pp. 49-49

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

UCLA - Biblioteca de Ciencias y Tecnologia Felix Morales Bueno

Generados por el servidor 'bibcyt.ucla.edu.ve' (3.22.61.73)
Adaptive Server Anywhere (07.00.0000)
ODBC
Sesión="" Sesión anterior=""
ejecutando Back-end Alejandría BE 7.0.7b0 ** * *
3.22.61.73 (NTM) bajo el ambiente Apache/2.2.4 (Win32) PHP/5.2.2.
usando una conexión ODBC (RowCount) al manejador de bases de datos..
Versión de la base de información BIBCYT: 7.0.0 (con listas invertidas [2.0])

Cliente: 3.22.61.73
Salida con Javascript


** Back-end Alejandría BE 7.0.7b0 *