Volume 42; Issue 7

Communications of the ACM

Volume 42; Issue 7
1

Intrusion detection for distributed applications

Year:
1999
Language:
english
File:
PDF, 204 KB
english, 1999
2

Trusted recovery

Year:
1999
Language:
english
File:
PDF, 172 KB
english, 1999
3

A cop on the beat: collecting and appraising intrusion evidence

Year:
1999
Language:
english
File:
PDF, 3.54 MB
english, 1999
4

Editorial pointers

Year:
1999
Language:
english
File:
PDF, 115 KB
english, 1999
5

Defensive information warfare

Year:
1999
Language:
english
File:
PDF, 1.32 MB
english, 1999
6

Inoculating software for survivability

Year:
1999
Language:
english
File:
PDF, 3.76 MB
english, 1999
7

A case of academic plagiarism

Year:
1999
Language:
english
File:
PDF, 858 KB
english, 1999
8

The dark side of employee email

Year:
1999
Language:
english
File:
PDF, 458 KB
english, 1999
9

The Jini architecture for network-centric computing

Year:
1999
Language:
english
File:
PDF, 3.46 MB
english, 1999
11

From Washington: Infowar: AK-47s, lies, and videotape

Year:
1999
Language:
english
File:
PDF, 164 KB
english, 1999
12

Viewpoint: challenging the new conventional wisdom of net commerce strategies

Year:
1999
Language:
english
File:
PDF, 126 KB
english, 1999
13

High-confidence design for security: don't trust---verify

Year:
1999
Language:
english
File:
PDF, 175 KB
english, 1999