skip to main content
Show Results with:

Results 1 - 10 of 13,501  for Everything in this catalogue

results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Material Type:
Article
Add to My workspace

Teaching for Conceptual Change in Security Awareness

Chan, Y.-Y.; Wei, V.K.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 6; NUMB 6, ; 2008, 67-69 -- IEEE COMPUTER SOCIETY (pages 67-69) -- 2008

Online access

2
Material Type:
Article
Add to My workspace

Challenges for Trusted Computing

Balfe, S. et al.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 6; NUMB 6, ; 2008, 60-66 -- IEEE COMPUTER SOCIETY (pages 60-66) -- 2008

Online access

3
Material Type:
Article
Add to My workspace

An RBAC Implementation and Interoperability Standard: The INCITS Cyber Security 1.1 Model

Coyne, E.; Weil, T.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 6; NUMB 1, ; 2008, 84-87 -- IEEE COMPUTER SOCIETY (pages 84-87) -- 2008

Online access

4
Material Type:
Article
Add to My workspace

Secure Communication without Encryption?

Martin, K.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 5; NUMB 2, ; 2007, 68-71 -- IEEE COMPUTER SOCIETY (pages 68-71) -- 2007

Online access

5
Material Type:
Article
Add to My workspace

Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection

Levine, J.; Grizzard, J.; Owen, H.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 4; NUMB 1, ; 2006, 24-32 -- IEEE COMPUTER SOCIETY (pages 24-32) -- 2006

Online access

6
Material Type:
Article
Add to My workspace

Implementing Trustworthy Services Using Replicated State Machines

Schneider, F. B.; Zhou, L.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 3; NUMB 5, ; 2005, 34 -- IEEE COMPUTER SOCIETY -- 2005

Check library holdings

7
Material Type:
Article
Add to My workspace

Time Out for Station Identification

Schneider, F. B.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 2; NUMB 5, ; 2004, 5-5 -- IEEE COMPUTER SOCIETY (pages 5-5) -- 2004

Check library holdings

8
Material Type:
Article
Add to My workspace

Designing and Evaluating Challenge-Question Systems

Just, M.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 2; NUMB 5, ; 2004, 32-39 -- IEEE COMPUTER SOCIETY (pages 32-39) -- 2004

Online access

9
Material Type:
Article
Add to My workspace

The Evolutionary Microcosm of Stock Spam

O Donnell, A. J.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 5; NUMB 1, ; 2007, 70-72 -- IEEE COMPUTER SOCIETY Part: Part 1; (pages 70-72) -- 2007

Check library holdings

10
Material Type:
Article
Add to My workspace

Smart Grid Challenges in Power System Information Security

Dan, G. et al.

IEEE SECURITY AND PRIVACY MAGAZINE. VOL 10; NUMB 4, ; 2012, 62-70 -- IEEE COMPUTER SOCIETY Part 4; (pages 62-70) -- 2012

Online access

Results 1 - 10 of 13,501  for Everything in this catalogue

results 1 2 3 4 5 next page

Refine Search Results

Refine my results

Access Options 

  1. Request to Reading Room  (9,457)
  2. Online: Reading Room only  (4,044)
  3. Refine further open sub menu

Creation date 

From To
  1. Before1996  (859)
  2. 1996To1999  (1,595)
  3. 2000To2003  (2,309)
  4. 2004To2008  (3,804)
  5. After 2008  (4,934)
  6. Refine further open sub menu

Additional Features 

  1. Abstract  (137)
  2. No Abstract  (13,364)
  3. Refine further open sub menu

Try a new search

Ignore my search and look for everything

by this Author/Contributor:

  1. Kaynak, O.
  2. McGraw, G.
  3. Donner, M.
  4. Trope, R. L.
  5. Palmer, C. C.

Searching Remote Databases, Please Wait