Search
for Topics
All Reviews
Browse All Reviews
>
Computing Milieux (K)
>
Management Of Computing And Information Systems (K.6)
> Miscellaneous (K.6.m)
Miscellaneous (K.6.m)
See Reviews
Subject Descriptors:
Security
(43)
Proper Nouns:
There are no proper nouns with reviews under K.6.m.
Reviews limited to:
All General Terms
Algorithms
Design
Documentation
Economics
Experimentation
Human factors
Languages
Legal Aspects
Management
Measurement
Performance
Reliability
Security
Standardization
Theory
Verification
Reviews about "
Miscellaneous (K.6.m)
":
Date Reviewed
IT security controls: a guide to corporate standards and frameworks
Viegas V., Kuyucu O., Apress, New York, NY, 2022. 376 pp. Type: Book (978-1-484277-98-0)
Nov 14 2022
Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science
Patterson W., Winston-Proctor C., CRC Press, USA, 2019. 261 pp. Type: Book (978-1-138617-78-0)
Jun 21 2022
Engineering trustworthy systems: a principled approach to cybersecurity
Saydjari O. Communications of the ACM 62(6): 63-69, 2019. Type: Article
Nov 4 2019
Application of big data for national security: a practitioner’s guide to emerging technologies
Akhgar B., Saathoff G., Arabnia H., Hill R., Staniforth A., Bayerl P., Butterworth-Heinemann, Waltham, MA, 2015. 316 pp. Type: Book (978-0-128019-67-2)
Sep 8 2016
Identity authentication based on keystroke latencies
Joyce R., Gupta G. Communications of the ACM 33(2): 168-176, 1990. Type: Article
Sep 1 1990
Auditing computer security: a manual with case studies
Vallabhaneni S., John Wiley & Sons, Inc., New York, NY, 1989. Type: Book (9780471626046)
Jul 1 1990
The cuckoo’s egg: tracking a spy through the maze of computer espionage
Stoll C., Doubleday, New York, NY, 1989. Type: Book (9789780385249461)
May 1 1990
more...
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy