cc.\*:("001A01G04")
Results 1 to 25 of 106
Selection :
Towards a Digital Spine: The Technological Methods that UK and US Publishers are Using to Tackle the Growing Challenge of E-Book PiracyBLANKFIELD, Sarah; STEVENSON, Iain.Publishing research quarterly. 2012, Vol 28, Num 2, pp 79-92, issn 1053-8801, 14 p.Article
European digital libraries: web security vulnerabilitiesKUZMA, Joanne.Library hi tech. 2010, Vol 28, Num 3, pp 402-413, issn 0737-8831, 12 p.Article
Towards automatic service generation and scheduling in the OpenCF projectSANTOS, A; ALMEIDA, F; BLANCO, V et al.International journal of web and grid services (Print). 2008, Vol 4, Num 4, pp 367-378, issn 1741-1106, 12 p.Article
CYBERSQUATTING : Gives the Web a Bad Name AgainKOEHLER, Wallace.Searcher (Medford, N.J). 2008, Vol 16, Num 8, issn 1070-4795, 12-15, 61 [5 p.]Article
An economic modelling approach to information security risk managementBOJANC, Rok; JERMAN-BLAZIC, Borka.International journal of information management. 2008, Vol 28, Num 5, pp 413-422, issn 0268-4012, 10 p.Article
Process-variance models in information security awareness researchTSOHOU, Angeliki; KOKOLAKIS, Spyros; KARYDA, Maria et al.Information management & computer security. 2008, Vol 16, Num 3, pp 271-287, issn 0968-5227, 17 p.Article
Danger is in the eye of the beholders : Social representations of information Systems security in healthcareVAAST, Emmanuelle.Journal of strategic information systems. 2007, Vol 16, Num 2, pp 130-152, issn 0963-8687, 23 p.Article
Who Searches the Searchers? Community Privacy in the Age of Monolithic Search EnginesPORITZ, Jonathan A.The Information society. 2007, Vol 23, Num 5, pp 383-389, issn 0197-2243, 7 p.Article
A strategic modeling technique for information security risk assessmentMISRA, Subhas C; KUMAR, Vinod; KUMAR, Uma et al.Information management & computer security. 2007, Vol 15, Num 1, pp 64-77, issn 0968-5227, 14 p.Article
Solvable problems in enterprise digital rights managementSEBES, E. John; STAMP, Mark.Information management & computer security. 2007, Vol 15, Num 1, pp 33-45, issn 0968-5227, 13 p.Article
Security information management as an outsourced serviceDEBAR, Hervé; VIINIKKA, Jouni.Information management & computer security. 2006, Vol 14, Num 5, pp 417-435, issn 0968-5227, 19 p.Article
L'authentification dans les réseaux ad hoc = Autentification in mobile adhoc networksALIOUANE, Lynda; BADACHE, Nadjib.RIST. 2006, Vol 16, Num 1, issn 1111-0015, 4-5, 8-9, 65-82 [22 p.]Article
Risques du cloud ouvrir le parapluieNUTTIN, Guillaume.Archimag (Vincennes). 2012, Num 251, pp 22-24, issn 0769-0975, 3 p.Article
Library blogs and user participation: a survey about comment spam in library blogsOGUZ, Fatih; HOLT, Michael.Library hi tech. 2011, Vol 29, Num 1, pp 173-188, issn 0737-8831, 16 p.Article
Authentication and Access: Accommodating Public Users in an Academic WorldWEBER, Lynne; LAWRENCE, Peg.Information technology and libraries. 2010, Vol 29, Num 3, pp 128-140, issn 0730-9295, 13 p.Article
Social Construction of Authorized Users in the Digital AgeXIAOHUA ZHU; ESCHENFELDER, Kristin R.College & research libraries. 2010, Vol 71, Num 6, pp 548-568, issn 0010-0870, 21 p.Article
la Cnil encadre l'usage des données biométriquesFERAL-SCHUHL, Christiane.Archimag (Vincennes). 2008, Num 214, pp 42-43, issn 0769-0975, 2 p.Article
RFID, privacy and the perception of risk : A strategic frameworkTHIESSE, Frédéric.Journal of strategic information systems. 2007, Vol 16, Num 2, pp 214-232, issn 0963-8687, 19 p.Article
Toward viable information security reporting systemsOLAV SVEEN, Finn; SARRIEGI, Jose M; RICH, Eliot et al.Information management & computer security. 2007, Vol 15, Num 5, pp 408-419, issn 0968-5227, 12 p.Conference Paper
A STOPE model for the investigation of compliance with ISO 17799-2005MOHAMED SAAD SALEH; ALRABIAH, Abdullah; SAAD HAJ BAKRY et al.Information management & computer security. 2007, Vol 15, Num 4, pp 283-294, issn 0968-5227, 12 p.Article
Design of a multimedia traffic classifier for SnortMARQUES, Oge; BAILLARGEON, Pierre.Information management & computer security. 2007, Vol 15, Num 2-3, pp 241-256, issn 0968-5227, 16 p.Article
Plugging information leaksMILLER, Ron.EContent (Wilton, Conn.). 2007, Vol 30, Num 1, issn 1525-2531, 4, 26-30 [6 p.]Article
Managing knowledge securityRYAN, Julie J. C. H.VINE. Very informal newsletter on library automation. 2006, Vol 36, Num 2, pp 143-145, issn 0305-5728, 3 p.Article
Stéganographie : Sécurité par dissimulation = Steganography : Security by dissimulationALI-PACHA, A; HADJ-SAID, N; BELGORAF, A et al.RIST. 2006, Vol 16, Num 1, issn 1111-0015, 5, 9, 101-114 [16 p.]Article
Les Agents logiciels mobiles et la sécurité = Software mobile agents and securityAOUADI, Hamed; BEN AHMED, Mohamed.RIST. 2005, Vol 15, Num 1-2, issn 1111-0015, 4, 10, 16, 59-75 [20 p.]Article