Search Results
ArticlesSee all articles results »
From journals and magazines
-
Deception Techniques in Computer Security
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1La9wwEBbb9tJL39CkSdGh3ZuJLFmxXUJK6uwS2mxLixfSk5EtiRhCUrLeQPJn-lc7etkODaWlF-OHEEbzaTQjfTOD0BuVE8FS2oDlJmmU7LI4qptaR0TwXGlp1lx7opt9_E6_fsvmxWTyM8TCWC6z8c9XfqrcEeVg4lUNv_E6VJh63_qDdbO_ROLD5adZBb5vOb0CyY6eQehhBk7fsvn_4gXeAWJM_O0_YKbvFF7APSAHroAduP4Veg6Vp7u4vXeT5HXlAgRdEQi_T99du8j2wN-zhPpR7Gaf37ZYWPL62pKsV-vLKwDQoPys5jtpxUWv_s3xhQPqjejpwx_EGTxddF3bs_HVeNciHmhZHmcD9iydsuh_YWE5pCEePER2kQiUkTu_UV5R8zRKmUuaFTS5T13bjrcprFqO714sEpNXw1RqYoQP62HgAHz-Us2Xx8dVOTsp76EH1NhSxvYuFv1SD-aPPwx3P-iisk3HO77b2-bO7dXemjDlE_TI-x74wIn7KZqo82focRAp9mr-OTrqpY8H6eP2HO-d7g-tPQD2dk733-EDHCCARxB4gZbzWVkcRb7iRtRQzrooTlNBG0kFZ0muwVPmRKYMXAaudc4zrbOEw8QmLCNCKiqJSJmoKUzpTHItBXuJMFeM6lrRuAbTUdHdvKakoVmTKsJlLpMNNA0jUjU-D70ph3JWuRh5Xvmh20C4b_jDpV75vclWGNLKz55VRWNwScCRSJLNP39-hR4O0NxC97vLtdp2RUFeWzn_AsMLgPA
Acm Computing Surveys, Volume 51, Issue 4, pp. 1 - 36
Journal Article : Full Text Online
-
COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEB7Ekx7EVcHXSg5ey6aTvgLLgpaWXUVXaxfZU2le7Elk0f9v0hTsbQ96HUImk0Dmm2T4PoBbzWnLUpQWuSkMooSFgZDCBLSNuTbK5dzuRzd7WONrlZX5QOrL9YR5emC_cRPZUiExNsgSGoU6yrg0SqYqiYzmMhTu9rVV-aCY6l5XGMbYKZQ6PZPAgmL2S8qPffYoj-Goh33kzrsbwZ7-OIHDARngKcynm1m-fHpZWYA5nWxm5Lmo35fVI7H2tyJfVYt6TXYNcPYzWJRFnc8Dt5Dm09NJNI7guTPYsJs-7GZX2OwcSKwZGqExFDZJa0y4QCoxk6mmseIquoD7vzu6_I9JruDAybT7NpBr2P_afuuxl1-46Q7uB1pSoM4
Carpathian Journal Of Electrical Engineering, Volume 17, Issue 1, pp. 150 - 157
Journal Article : Full Text Online
-
Studying users' computer security behavior: A health belief perspective
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA7Fg3jxDdb6yEEQhHW3yT4SKYVaXcSD4Ovgaclms1iRWtz2_zt5VQvSgx43j12yk0y-ZL6ZQehE8UjQjEhAbhUJ4pR2g1KWdRCJhKu60nuuseiy2xdy_8DyYQsNvS-MplU63W91utHWriR0fzOcjEbhoybQAzxJDebpJtqjHNCEntn51eVcG1t8bB9SmpnUjybYt-7qzZyG8FU1jeVW6qie2qP2943qp8qmbh_KN9DYj8CQsM8tCcVeRyyws32Yx38OdhOtO8SKB7bdFmqp8TZa9YT5HXSnqYjaWQrrC4_mFPde-9LlisCNS4_XC1_72IcEuMADbP0voQgwcI0n3y6fu-g5v34a3gQuS0MgKUun2qGNMiG7Msl4SWMBs6LOJGEsZpEUmWACTi0McJHMWM0BMcQloSKrKlKTKhac7iGcKErqUpFuCXBDkZSXJIJXyExFScWruI0iL4tCutjlOoXGe-FJam8FiM_m1IQTDYivjc7mXSY2cMeyxrEXcLEgkAI2lmXdOn4yFG7p6_o0jeDQy9roeF4La1YbYsRYfcyaglJuzF_7f_tsB61Zm5Zmwh2glennTB3aZBZHZvJ_ASd_C2I
Decision Support Systems, Volume 46, Issue 4, pp. 815 - 825
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
-
-
Computer security
https://find.library.duke.edu/catalog/DUKE000340885
Book
This item is currently Available Library Service Center, 658.47 H873, C738, 1979 c.1
Our WebsiteSee all website results »
Guides, policies, news more
-
A PSA on Password Security
https://dukelawref.blogspot.com/2009/04/psa-on-password-security.html
For related information on computer security, check out the Law School's Academic Technologies page ( (...)
-
Getting Started - Computer Science - LibGuides at Duke University
https://guides.library.duke.edu/cs
Dictionary of Computing, 6th ed. Encyclopedia of Computer Science America's top computer and technical jobs The complete (...)
-
Getting Started - Computer Science - LibGuides at Duke University
https://guides.library.duke.edu/c.php?g=289839&p=1931481
Dictionary of Computing, 6th ed. Encyclopedia of Computer Science America's top computer and technical jobs The complete (...)
Collection GuidesSee all collection guides results »
Detailed inventories of archival collections
-
Cross Media Creative Group/Discovery Education: All About Computers and Cyber Security, 2008
https://archives.lib.duke.edu/catalog/haloawards_aspace_8374113764899075f0e9919c60d108fc
In: Cause Marketing Forum. Halo Awards Records, 2002-2012 and undated, 2002-2012 and undated » 2008 » Social Service/Educational, 2008 -
Annual Computer Application Symp. Of N.U. Soceity of Security Analysts, New York, 1970
https://archives.lib.duke.edu/catalog/morgenst_aspace_ref385_kq9
-
Security, 1974
https://archives.lib.duke.edu/catalog/uabusfindiv_aspace_ref46_zut
In: Business and Finance Division records, 1956-1983 » Business Auxiliaries, 1968-1978 » Computation Center
Archival MaterialsSee all archival materials results »
Manuscripts and archival materials
-
Towards building a network security infrastructure
https://find.library.duke.edu/catalog/DUKE002978860
Archival and manuscript material, Book
Check Holdings for this item's availability University Archives, Library Service Center
-
Performance analysis of secure information communication using the transport layer security (...)
https://find.library.duke.edu/catalog/DUKE002596909
Archival and manuscript material, Book
Check Holdings for this item's availability Library Service Center, University Archives
-
Embedded art : art in the name of security
https://find.library.duke.edu/catalog/DUKE004286376
Archival and manuscript material, Book
This item is currently Not Available Lilly Library, N6490 .E43 2009
Some materials and descriptions may include offensive content. More info