Search Results

    ArticlesSee all articles results »

    From journals and magazines

    1. Deception Techniques in Computer Security

      by Kheir, Nizar; Balzarotti, Davide and Han, Xiao

      Acm Computing Surveys, Volume 51, Issue 4, pp. 1 - 36

      Journal Article : Full Text Online

    2. COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY

      by Marijan MIJATOVIĆ and Marko MIJATOVIĆ

      Carpathian Journal Of Electrical Engineering, Volume 17, Issue 1, pp. 150 - 157

      Journal Article : Full Text Online

    3. Studying users' computer security behavior: A health belief perspective

      by Kankanhalli, Atreyi; Ng, Boon-Yuen and Xu, Yunjie (Calvin)

      Decision Support Systems, Volume 46, Issue 4, pp. 815 - 825

      Journal Article : Full Text Online

    See all 457,917 Articles results

    Back to results navigation

    Books & MediaSee all books & media results »

    Books, music, movies and more

    1. Computer security

      EBS Trust (Firm).

      Book, Video : View Online

    2. Computer security

      EBS Trust (Firm)

      Video : View Online

    3. Computer security

      David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick.

      Book

      This item is currently Available Library Service Center, 658.47 H873, C738, 1979 c.1

    See all 28,728 Books & Media results

    Back to results navigation


    Our WebsiteSee all website results »

    Guides, policies, news more

    1. A PSA on Password Security

      For related information on computer security, check out the Law School's Academic Technologies page ( (...)

    2. Getting Started - Computer Science - LibGuides at Duke University

      Dictionary of Computing, 6th ed.   Encyclopedia of Computer Science   America's top computer and technical jobs   The complete (...)

    3. Getting Started - Computer Science - LibGuides at Duke University

      Dictionary of Computing, 6th ed.   Encyclopedia of Computer Science   America's top computer and technical jobs   The complete (...)

    See all 115 website results

    Back to results navigation


    Manuscript Collections

    Find books, manuscripts, and archive materials from Rubenstein Library


    Archival MaterialsSee all archival materials results »

    Manuscripts and archival materials

    1. Towards building a network security infrastructure

      by Chong Xu.

      Archival and manuscript material, Book

      Check Holdings for this item's availability University Archives, Library Service Center

    2. Performance analysis of secure information communication using the transport layer security (...)

      by Nishith Shah.

      Archival and manuscript material, Book

      Check Holdings for this item's availability Library Service Center, University Archives

    3. Embedded art : art in the name of security

      presented by Akademie der Künste, Berlin, and BBM -- Beobachter der Bediener von Maschinen / editors, Olaf Arndt ,,. [et al].

      Archival and manuscript material, Book

      This item is currently Not Available Lilly Library, N6490 .E43 2009 

    See all 6 Archival Materials results

    Back to results navigation


    Some materials and descriptions may include offensive content. More info

    More Search Options