Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Kenneth P. Weiss
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1994) 2 (3): 43–45.
Published: 01 August 1994
Journal Articles
To Serve and Protect: : Reconciling Information Protection with LAN Environments
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1994) 2 (3): 19–25.
Published: 01 August 1994
Journal Articles
Data Integrity and Security: Who′s in Charge Here Anyway?
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1993) 1 (4)
Published: 01 April 1993
