Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ethical and Social Issues in the Information Age, Second Edition.. Texts in Computer Science Springer, (2003)Social History of Computing and Online Social Communities., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Teaching cryptography using hands-on labs (abstract only)., , , and . SIGCSE, page 673. ACM, (2012)Ethical and Social Issues in the Information Age, Third Edition.. Texts in Computer Science Springer, (2007)TMAS A Capstone Project., , , and . FECS, page 226-231. CSREA Press, (2006)Network Intrusion Detection Based on Bayesian Networks., , and . SEKE, page 791-794. Knowledge Systems Institute Graduate School, (2008)Ethical and Social Issues in the Information Age, Fourth Edition.. Texts in Computer Science Springer, (2010)Design and Configuration of a Network Security and Forensics Lab., , and . International Conference on Internet Computing, page 242-246. CSREA Press, (2005)Ethical and social issues in the information age.. Undergraduate texts in computer science Springer, (1998)A Flexible Context-Aware Authorization Framework for Mediation Systems., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 684-685. Springer, (2006)