books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Personal
Book Requests
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 16; Issue 7
Main
Computers & Security
Volume 16; Issue 7
Computers & Security
Volume 16; Issue 7
1
Cognitive, associative and conventional passwords: Recall and guessing rates
Julie Bunnell
,
John Podd
,
Ron Henderson
,
Renee Napier
,
James Kennedy-Moffat
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 1.17 MB
Your tags:
english, 1997
2
From the editor
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 188 KB
Your tags:
english, 1997
3
The strategic values of information security in business
Donn B. Parker
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 1.23 MB
Your tags:
english, 1997
4
Encryption policy — A UK perspective
Nigel Hickson
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 688 KB
Your tags:
english, 1997
5
First steps towards a european union policy on the securing of electronic communications
Chris Pounder
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 455 KB
Your tags:
english, 1997
6
Penetration testing and system audit — experience gained during the investigation of systems within the UK
Andy Jones
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 891 KB
Your tags:
english, 1997
7
Managing security for outsourcing contracts
John Sherwood
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 707 KB
Your tags:
english, 1997
8
Information systems security metrics management
Gerald Kovacich
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 769 KB
Your tags:
english, 1997
9
Backdoor closes, for now, on crypto plan
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 96 KB
Your tags:
english, 1997
10
Securing your users' Web browsers
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 96 KB
Your tags:
english, 1997
11
New twists on secure VPNS
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 220 KB
Your tags:
english, 1997
12
WorldSecure Server combats E-mail plagues
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 129 KB
Your tags:
english, 1997
13
ISS unveils 4-step security program
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 129 KB
Your tags:
english, 1997
14
Privacy better than ‘Pretty Good’
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 129 KB
Your tags:
english, 1997
15
PKI provides a base for secure transactions
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 250 KB
Your tags:
english, 1997
16
Software could spoof-proof domain names
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
17
Low-overhead cryptography
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
18
User authentication, VPN in an appliance
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
19
Self-mutating Word viruses create strain
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 251 KB
Your tags:
english, 1997
20
Detecting network intruders
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 129 KB
Your tags:
english, 1997
21
A new and nasty way to flood networks with spam
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 252 KB
Your tags:
english, 1997
22
Smartcards: world access
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
23
Servers to spam: drop dead
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
24
Monitoring as you like it
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
25
VPNS: security with an uncommon touch
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 125 KB
Your tags:
english, 1997
26
Unlocking virtual private networks
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 125 KB
Your tags:
english, 1997
27
Secure electronic-mail: return to sender
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 125 KB
Your tags:
english, 1997
28
Calendar
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 119 KB
Your tags:
english, 1997
29
International board of referees
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 86 KB
Your tags:
english, 1997
30
IFip technical committee 11
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 245 KB
Your tags:
english, 1997
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×