1

What makes critical infrastructures Critical?

Year:
2010
Language:
english
File:
PDF, 258 KB
english, 2010
2

Internet Fraud: Mythical Online Scams

Year:
2003
Language:
english
File:
PDF, 155 KB
english, 2003
5

PATHOLOGIC CONFORMATIONS OF PRION PROTEINS

Year:
1998
Language:
english
File:
PDF, 1.12 MB
english, 1998
6

Computer-aided drug discovery and design

Year:
1993
Language:
english
File:
PDF, 86 KB
english, 1993
14

Terrorism and Cyberspace

Year:
2002
Language:
english
File:
PDF, 169 KB
english, 2002
17

Corporate Security Intelligence: An Oxymoron?

Year:
2001
Language:
english
File:
PDF, 208 KB
english, 2001
20

Strategic Security Intelligence — Embedded Security

Year:
2002
Language:
english
File:
PDF, 160 KB
english, 2002
21

Managing network security: Simulating network security

Year:
1999
Language:
english
File:
PDF, 832 KB
english, 1999
25

Simulating cyber attacks, defences, and consequences

Year:
1999
Language:
english
File:
PDF, 3.70 MB
english, 1999
26

Managing network security: Attack and defence strategies

Year:
1999
Language:
english
File:
PDF, 571 KB
english, 1999
28

Prions: so many fibers, so little infectivity

Year:
2004
Language:
english
File:
PDF, 328 KB
english, 2004
31

Folding & Design: introduction to a new journal

Year:
1996
Language:
english
File:
PDF, 25 KB
english, 1996
35

A cost analysis of typical computer viruses and defenses

Year:
1991
Language:
english
File:
PDF, 1.17 MB
english, 1991
36

Managing network security — Red teaming

Year:
1998
Language:
english
File:
PDF, 344 KB
english, 1998
43

The prion folding problem

Year:
1997
Language:
english
File:
PDF, 722 KB
english, 1997
46

Computer viruses: Theory and experiments

Year:
1987
Language:
english
File:
PDF, 1.46 MB
english, 1987