Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: magazinearticle
|
![]() |
What is computer security?Bishop, M.IEEE security & privacy, 2003-01, Vol.1 (1), p.67-69New York: IEEETexto completo disponível |
2 |
Material Type: magazinearticle
|
![]() |
Health 'care': An examination on the art of caringBishop, M JMedical Economics, 2015-06, Vol.92 (12), p.18-19United States: UBM LLCTexto completo disponível |
3 |
Material Type: magazinearticle
|
![]() |
Landslide hypothesis for the origin of Haleakala Volcano's crater and great valleys, HawaiiBishop, Kim MGeosphere (Boulder, Colo.), 2021-10, Vol.17 (5), p.1405-1421 [Periódico revisado por pares]Geological Society of AmericaTexto completo disponível |
4 |
Material Type: magazinearticle
|
![]() |
Joining the security education communityFrincke, D. ; Bishop, M.IEEE security & privacy, 2004-09, Vol.2 (5), p.61-63New York: IEEETexto completo disponível |
5 |
Material Type: magazinearticle
|
![]() |
Who owns your computer? [digital rights management]Bishop, M. ; Frincke, D.A.IEEE security & privacy, 2006-03, Vol.4 (2), p.61-63New York: IEEETexto completo disponível |
6 |
Material Type: magazinearticle
|
![]() |
Teaching robust programmingBishop, M. ; Frincke, D.IEEE security & privacy, 2004-03, Vol.2 (2), p.54-57New York: IEEETexto completo disponível |
7 |
Material Type: magazinearticle
|
![]() |
Academic degrees and professional certificationBishop, M. ; Frincke, D.IEEE security & privacy, 2004-11, Vol.2 (6), p.56-58New York: IEEETexto completo disponível |
8 |
Material Type: magazinearticle
|
![]() |
Who owns your computer? [digital rights managementBishop, M. ; Frincke, D.A.IEEE security & privacy, 2006-03, Vol.4 (2), p.61-63Texto completo disponível |
9 |
Material Type: magazinearticle
|
![]() |
A human endeavor. Lessons from Shakespeare and beyondBishop, M. ; Frincke, D.IEEE security & privacy, 2005-07, Vol.3 (4), p.49-51New York: IEEETexto completo disponível |
10 |
Material Type: magazinearticle
|
![]() |
The threat from the net [Internet security]Bishop, M. ; Cheung, S. ; Wee, C.IEEE spectrum, 1997-08, Vol.34 (8), p.56-63New York, NY: IEEETexto completo disponível |