Within the last year
Within the past 3 years
1 - 10 of 23 articles
As my term ends, I offer my perspective on two important challenges facing ACM.
DNS cache scanning across a sample set of more than 500,000 name servers revealed the extent of last year's Sony rootkit infestation on client machines.
Going back to basics.
In current IT practices, the task of managing post-deployment system changes often falls in no-man's land.
Searching for explanations to increasing global software piracy rates.
The law alone won't prevent an unauthorized visit or even a deliberate attack. Security depends on being able to think like an attacker.
Enlist hacker expertise, but stay with academic fault naming conventions, when defending against the risk of exploitation of vulnerabilities and intrusions.
Who commits software misuse? Knowing the answer to this question will help organizations protect their information systems.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.