Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Miscellaneous (K.6.m)
 
  Miscellaneous (K.6.m) See Reviews  
 
Subject Descriptors:
Security (43)
 
Proper Nouns:
There are no proper nouns with reviews under K.6.m.
 
 
Reviews limited to:
 
 

Reviews about "Miscellaneous (K.6.m)":
Date Reviewed
 IT security controls: a guide to corporate standards and frameworks
Viegas V., Kuyucu O., Apress, New York, NY, 2022. 376 pp.  Type: Book (978-1-484277-98-0)
Nov 14 2022
Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science
Patterson W., Winston-Proctor C., CRC Press, USA, 2019. 261 pp.  Type: Book (978-1-138617-78-0)
Jun 21 2022
Engineering trustworthy systems: a principled approach to cybersecurity
Saydjari O. Communications of the ACM 62(6): 63-69, 2019.  Type: Article
Nov 4 2019
Application of big data for national security: a practitioner’s guide to emerging technologies
Akhgar B., Saathoff G., Arabnia H., Hill R., Staniforth A., Bayerl P., Butterworth-Heinemann, Waltham, MA, 2015. 316 pp.  Type: Book (978-0-128019-67-2)
Sep 8 2016
Identity authentication based on keystroke latencies
Joyce R., Gupta G. Communications of the ACM 33(2): 168-176, 1990.  Type: Article
Sep 1 1990
Auditing computer security: a manual with case studies
Vallabhaneni S., John Wiley & Sons, Inc., New York, NY, 1989.  Type: Book (9780471626046)
Jul 1 1990
The cuckoo’s egg: tracking a spy through the maze of computer espionage
Stoll C., Doubleday, New York, NY, 1989.  Type: Book (9789780385249461)
May 1 1990
more...
 
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy