Referencias Analíticas
*
Wireless Hotspot: Petri Dish Of Wireless Security
Potter, Bruce
pp. 51-56
|
*
The Learning Edge.
Armour, Phillip G.
pp. 19-22
|
*
The Application of MODEL CHECKING for SECURING E-COMMERCE TRANSACTIONS
Brinton Anderson, Bonnie
; Hansen, James V.
; Lowry, Paul Benjamin
; Summers, Scott L.
pp. 97-101
|
*
Software Security Is Software Reliability
Lindner, Felix
pp. 57-61
|
*
Security Through Legality
Bono, Stephen
; Rubin, Aviel
; Stubblefield, Adam
; Green, Matthew
pp. 41-43
|
*
Research Lessons From Hardware Hacking.
Grand, Joe
pp. 44-48
|
*
RECIPROCITY: THE GOLDEN RULE of IS-User Service Relationship Quality and Cooperation.
Carr, Christopher L.
pp. 77-83
|
*
Plagiarism on the Rise
Boisvert, Ronald F.
; Irwin, Mary Jane
pp. 23-24
|
*
Piracy, Computer Crime, And Is Misuse At The University.
Cronan, Timothy Paul
; Jones, Thomas W.
; Foltz, C., Bryan
pp.85-90
|
*
My Aim Is To Close The Gap Between The Communities Of Computer Professionals And Computer Hacking.
Conti, Gregory
pp. 34-36
|
*
Global Software Piracy: Can Economic Factors Alone Explain The Trend?
Bagchi, Kallol
; Kirs, Peeter
; Cerveny, Robert
pp. 70-75
|
*
Farewell Address: The Growing and Graying of ACM.
Patterson, David A.
pp. 15-18
|
*
Explorations In Namespace: White-Hat Hacking Across The Domain Name System.
Kaminsky, Dan
pp. 62-68
|
*
ENTERPRISE INTEGRATION: Across the Globally Disbursed Service Organization.
Shore, Barry
pp. 102-106
|
*
EHRs: Electronic Health Records or Exceptional Hidden Risks?
Charette, Robert
pp. 120-120
|
*
Copyrighting Standards.
Samuelson, Pamela
pp. 27-31
|
*
Academic Freedom And The Hacker Ethic.
Cross, Tom
pp. 37-40
|
*
A Systematic Approach In Managing Post-Deployment System Changes.
Kang, David
; Chiang, Roger
pp. 91-95
|
*
A Simple Approach to Improving Email Communication.
Jackson, Thomas
; Burgess, Anthony
; Edwards, Janet
pp. 107-109
|
*
A Brief History Of Hardware Hacking.
Grand, Joe
pp. 49-49
|
|