researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
17
, Issue
2
96
--
97
Bill Hancock
.
From the Editor
99
--
109
Bill Hancock
.
Who do you call for, CISSP
110
--
114
Richard Ford
.
What a littledefinution can do
115
--
118
Stephen Hinde
.
Cyber Wars and other threats
124
--
128
Chris Pounder
.
Security and the new Data Protection law
129
--
135
Gerald L. Kovacich
.
Electronic-internet business and security
143
--
150
Sharman Lichtenstein
.
Internet risks for companies
171
--
176
Mohammad Peyravian
,
Allen Roginsky
,
Ajay D. Kshemkalyani
.
On probabilities of hash value matches
177
--
184
Ed Dawson
,
Helen Gustafson
.
A Method for Measuring Entropy of Symmetric Cipher Key Generators