Part of the Information Security Commons
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information, Matthew G. Judge, Paul Williams, Yong Kim, Barry E. Mullins Faculty Publications
Link
Cyberspace Policy for Critical Infrastructures, Dorsey Wilkin, Richard Raines, Paul Williams, Kenneth M. Hopkinson Faculty Publications
Advanced Search