From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Code of Ethics, , , , , , , , , и 3 other автор(ы). (16.10.1992)Software testing and certification., и . SIGMETRICS Perform. Evaluation Rev., 1 (1): 3-8 (1972)Risks of risk-based security.. Commun. ACM, 50 (3): 120 (2007)Making computers safer.. AFIPS National Computer Conference, том 44 из AFIPS Conference Proceedings, стр. 927. AFIPS Press, (1975)Computer security differences for accidental and intentionally caused losses.. AFIPS National Computer Conference, том 47 из AFIPS Conference Proceedings, стр. 1145-1150. AFIPS Press, (1978)Computer abuse perpetrators and vulnerabilities of computer systems.. AFIPS National Computer Conference, том 45 из AFIPS Conference Proceedings, стр. 65-73. AFIPS Press, (1976)From the Editor.. Information Systems Security, 4 (1): 3 (1995)From the Editor.. Information Systems Security, 3 (1): 3-4 (1994)Vulnerabilities of EFTs to Intentionally Caused Losses.. Commun. ACM, 22 (12): 654-660 (1979)Computer and Data Abuse.. ACM Pacific, стр. 185-187. (1975)