-
1Periodical
Authors: Watson, Robert N.M.1, robert.watson@cl.cam.ac.uk, Baldwin, John2, john@araratriver.co, Chisnall, David1, David.Chisnall@cl.cam.ac.uk, Chen, Tony3, tonychen@microsoft.com, Clarke, Jessica4, jessica.clarke@cl.cam.ac.uk, Davis, Brooks5, brooks.davis@sri.com, Filardo, Nathaniel1, nwf20@cam.ac.uk, Gutstein, Brett1, brett@gutste.in, Jenkinson, Graeme6, graeme@capabilitieslimited.co.uk, Laurie, Ben7, benl@google.com, Mazzinghi, Alfredo4, am2419@cam.ac.uk, Moore, Simon4, Simon.Moore@cl.cam.ac.uk, Neumann, Peter G.5, neumann@csl.sri.com, Okhravi, Hamed8, hamed.okhravi@ll.mit.edu, Richardson, Alex7, alexrichardson@google.com, Rebert, Alex7, arebert@google.com, Sewell, Peter4, Peter.Sewell@cl.cam.ac.uk, Tratt, Laurence9, laurie@tratt.net, Vijayaraghavan, Murali7, muralivi@google.com, Vincent, Hugo10, hugo.vincent@arm.com
Source: Communications of the ACM; Feb2025, Vol. 68 Issue 2, p40-45, 6p
-
2Periodical
Authors: Kern, Christoph1
Source: Communications of the ACM; Jun2024, Vol. 67 Issue 6, p52-60, 9p
-
3Academic Journal
Authors: Yost, Jeffrey R.
Source: IEEE Annals of the History of Computing IEEE Annals Hist. Comput. Annals of the History of Computing, IEEE. 37(2):46-58 Jan, 2015
-
4Academic Journal
Authors: Luo, Zhenhao1, Wang, Pengfei1, pfwang@nudt.eud.cn, Xie, Wei1, Zhou, Xu1, Wang, Baosheng1
Source: Applied Sciences (2076-3417); Dec2023, Vol. 13 Issue 23, p12751, 22p
-
5Periodical
Authors: RAPHAËL CW PHAN1, MASAYUKI ABE2, LYNN BATTEN3, JUNG HEE CHEON4, DAWSON, ED5, GALBRAITH, STEVEN6, JIAN GUO7, LUCAS HUI8, KWANGJO KIM9, XUEJIA LAI10, DONG HOON LEE11, MITSURU MATSUI12, TSUTOMU MATSUMOTO13, SHIHO MORIAI14, PHONG NGUYEN15, DINGYI PEI16, DUONG HIEU PHAN17, PIEPRZYK, JOSEF18, HUAXIONG WANG7, HANK WOLFE19
Source: Communications of the ACM. Apr2020, Vol. 63 Issue 4, p76-81. 6p. 3 Color Photographs, 1 Chart.
Subject Terms: *Computer security software, *Cryptography
Geographic Terms: Asia
-
6Academic Journal
Alternate Title: MODERN COMPUTER SECURITY SOFTWARE PACKAGE FOR WORKSTATIONS AS AN ELEMENT OF SECURITY STRATEGY AT COLLEGES AND UNIVERSITIES IN POLAND.
Authors: ZAKONNIK, ŁUKASZ1 lzakonnik@wzmail.uni.lodz.pl
Source: Studia i Materialy Polskiego Stowarzyszenia Zarzadzania Wiedza / Studies & Proceedings Polish Association for Knowledge Management. 2011, Issue 53, p167-179. 13p.
Subject Terms: *COMPUTER security software, *DATA privacy, *COMPUTER systems, *INFORMATION technology security, *MICROCOMPUTER workstations (Computers), *UNIVERSITIES & colleges
Geographic Terms: POLAND
-
7
Source: F-Secure Oyj MarketLine Company Profile. 4/13/2022, p1-25. 25p.
Subject Terms: *Computer security software, *Computer software industry
Geographic Terms: Finland
Company/Entity: F-Secure Corp.
-
8Periodical
Authors: Howard, L.S. (AUTHOR)
Source: Claims Journal. 1/15/2025, pN.PAG-N.PAG. 1p.
Subject Terms: *Computer security software, *Fortune 500 companies, *Small business, *Email spoofing, *Insured losses, Sustainable development reporting, Regulatory compliance
Company/Entity: Allianz SE
-
9
Source: F-Secure Oyj MarketLine Company Profile. 11/5/2021, p1-25. 25p.
Subject Terms: *Computer security software, *Computer software industry
Geographic Terms: Finland
Company/Entity: F-Secure Corp.
-
10Periodical
Authors: Brooks, Michael
Source: New Scientist. 3/3/2018, Vol. 237 Issue 3167, p40-43. 4p.
-
11
Source: F-Secure Oyj MarketLine Company Profile. 11/5/2020, p1-34. 34p.
Subject Terms: *Computer security software, *Computer software industry
Geographic Terms: Finland
Company/Entity: F-Secure Corp.
-
12Academic Journal
Authors: BOTACIN, MARCUS1, mfbotacin@inf.ufpr.br, MOREIRA, FRANCIS B.2, fbmoreira@inf.ufrgs.br, NAVAUX, PHILIPPE O. A.2, navaux@inf.ufrgs.br, GRÉGIO, ANDRÉ3, gregio@inf.ufpr.br, ALVES, MARCO A. Z.3, mazalves@inf.ufpr.br
Source: ACM Transactions on Privacy & Security; Mar2022, Vol. 25 Issue 2, p1-34, 34p
-
13Periodical
Authors: Garg, Sanjam1 sanjamg@berkeley.edu, Gentry, Craig2 cbgentry@us.ibm.com, Halevi, Shai2 haih@us.ibm.com, Raykova, Mariana3 mariana@cs.columbia.edu, Sahai, Amit4 sahai@cs.ucla.edu, Waters, Brent5 bwaters@cs.utexas.edu
Source: Communications of the ACM. May2016, Vol. 59 Issue 5, p113-120. 8p.
Subject Terms: *Computer security software, *Cryptography, *Data encryption, *Computer security, Computer software security
-
14Periodical
Source: Employee Benefits & Wellness Excellence. Dec2023, Vol. 10 Issue 12, p10-14. 5p.
Subject Terms: *Computer security software, *Flexible work arrangements, *Telecommuting, Data privacy, Machine learning
-
15Periodical
Authors: GENKIN, DANIEL1,2, danielg3@cs.technion.ac.il, PACHMANOV, LEV3, levp@tau.ac.il, PIPMAN, ITAMAR3, itamarpi@tau.ac.il, SHAMIR, ADI4, adi.shamir@weizmann.ac.il, TROMER, ERAN5, tromer@cs.tau.ac.il
Source: Communications of the ACM; Jun2016, Vol. 59 Issue 6, p70-79, 10p, 6 Color Photographs, 3 Diagrams, 2 Charts, 2 Graphs
-
16Academic Journal
Authors: Brown, Evan1, ebrown@internetcases.com
Source: Journal of Internet Law; May2021, Vol. 24 Issue 9, p14-19, 6p
-
17
Source: F-Secure Oyj MarketLine Company Profile. 12/4/2019, p1-24. 24p.
Subject Terms: *Computer security software, *Computer software industry
Geographic Terms: Finland
Company/Entity: F-Secure Corp.
-
18Academic Journal
Authors: Barak, Dheer Dhwaj1
Source: International Journal of Computer Science & Management Studies; Sep2021, Vol. 42 Issue 3, p12-16, 5p
-
19Periodical
Authors: SOLOMON, BRIAN
Source: Forbes. 5/4/2015, Vol. 195 Issue 6, p94-104. 6p. 1 Color Photograph.
Subject Terms: *Computer security software
Company/Entity: Tanium Inc. , Andreessen Horowitz (Company)
People: Hindawi, David, Hindawi, Orion
-
20Periodical
Source: Employee Benefits & Wellness Excellence. Nov2023, Vol. 10 Issue 11, p15-18. 4p.