Searching for:
Found 42 results
sorted by:
Pages: 1 2 3 ... 5
Hal Berghel : Faith-based security. Commun. ACM (CACM) 51(4):13-17 (2008)
Hal Berghel : BRAP forensics. Commun. ACM (CACM) 51(6):15-20 (2008)
Hal Berghel : Hiding data, forensics, and anti-forensics. Commun. ACM (CACM) 50(4):15-20 (2007)
Hal Berghel : Credit Card Forensics. Commun. ACM (CACM) 50(12):11-14 (2007)
Hal Berghel : Better-than-nothing security practices. Commun. ACM (CACM) 50(8):15-18 (2007)
Hal Berghel : Fungible credentials and next-generation fraud. Commun. ACM (CACM) 49(12):15-19 (2006)
Hal Berghel, David Hoelzer : Disk wiping by any other name. Commun. ACM (CACM) 49(8):17-21 (2006)
Hal Berghel : Phishing mongers and posers. Commun. ACM (CACM) 49(4):21-25 (2006)
Hal Berghel, Jacob Uecker : WiFi attack vectors. Commun. ACM (CACM) 48(8):21-28 (2005)
Hal Berghel : The two sides of ROI: return on investment vs. risk of incarceration. Commun. ACM (CACM) 48(4):15-20 (2005)
(search: 0.001 sec. - facets: 0.004 sec.) (?)
Pages: 1 2 3 ... 5

Refine by VENUE:

show:

Refine by YEAR:

show:
[No canvas support]