Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6)
  Security and Protection (D.4.6) See Reviews  
Subject Descriptors:
Access Controls (125)
Authentication (52)
Cryptographic Controls (97)
Information Flow Controls (29)
Invasive Software (33)
Security Kernels (6)
Verification (11)
Proper Nouns:
Xenix (1)
Reviews limited to:

Reviews about "Security and Protection (D.4.6)":
Security, privacy and user interaction
Jakobsson M.,  Springer International Publishing, New York, NY, 2020. 153 pp. Type: Book (978-3-030437-53-4)
Secure and effective implementation of an IOTA light node using STM32
Stucchi D., Susella R., Fragneto P., Rossi B.  BlockSys 2019 (Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, New York, NY,  Nov 10, 2019) 28-29, 2019. Type: Proceedings
 Foundations of information security: a straightforward introduction
Andress J.,  No Starch Press, San Francisco, CA, 2019. 248 pp. Type: Book (978-1-718500-04-4)
Rethinking regex engines to address ReDoS
Davis J.  ESEC/FSE 2019 (Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Tallinn, Estonia,  Aug 26-30, 2019) 1256-1258, 2019. Type: Proceedings
Cybercryptography: applicable cryptography for cyberspace security
Yan S.,  Springer International Publishing, New York, NY, 2019. 436 pp. Type: Book (978-3-319725-34-5), Reviews: (2 of 2)
Security and privacy on blockchain
Zhang R., Xue R., Liu L.  ACM Computing Surveys 52(3): 1-34, 2019. Type: Article
Dynamic malware analysis in the modern era--a state of the art survey
Or-Meir O., Nissim N., Elovici Y., Rokach L.  ACM Computing Surveys 52(5): 1-48, 2019. Type: Article
Related Topics
D.4.6 Security and Protection
  - Security and Protection
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy