Matt Bishop
Matt Bishop (born 25 December 1962) is an English journalist, author, novelist and public relations executive. Provided by Wikipedia
Showing 1 - 20 results of 25 for search 'Bishop, Matt', query time: 0.06s
Refine Results
-
1
Snowdrops : a monograph of cultivated Galanthus by Bishop, Matt
Cox Green, Maidenhead, UK : Griffin Press, 2006
Rev.Call Number: Loading…
Located: Loading…Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
2
Analyzing the security of an existing computer system by Bishop, Matt
[Moffett Field, Calif.?] : Research Institute for Advanced Computer Science, NASA Ames Research Center, 1986Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
3
The RIACS intelligent auditing and categorizing system by Bishop, Matt
[Moffett Field, Calif.] : Research Institute for Advanced Computer Science, 1988Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
4
A proactive password checker by Bishop, Matt
[Washington, DC] : [Springfield, Va.] : [National Aeronautics and Space Administration] ; [National Technical Information Service, distributor], 1990Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
5
The fast encryption package by Bishop, Matt
[Moffett Field, Calif.] : Research Institute for Advanced Computer Science, 1988Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
6
A security analysis of version 2 of the Network Time Protocol NPT : a report to the Privacy and Security Research Group by Bishop, Matt
[Washington, DC] : [Springfield, Va.] : [National Aeronautics and Space Administration] ; [National Technical Information Service, distributor], 1991Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
7
Implementation notes on bdes (1) by Bishop, Matt
[Washington, DC] : [Springfield, Va.] : [National Aeronautics and Space Administration] ; [National Technical Information Service, distributor], 1991Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
8
An overview of computer viruses in a research environment by Bishop, Matt
[Washington, DC] : [Springfield, Va.] : [National Aeronautics and Space Administration] ; [National Technical Information Service, distributor], 1991Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
9
Theft of information in the take-grant protection model by Bishop, Matt
[Washington, DC] : [Springfield, Va.] : [National Aeronautics and Space Administration] ; [National Technical Information Service, distributor], 1989Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
10
Profiling under UNIX by patching by Bishop, Matt
[Moffett Field, Calif.?] : Research Institute for Advanced Computer Science, NASA Ames Research Center, 1986Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
11
Applying the take-grant protection model by Bishop, Matt (Matthew A.)
Hanover, NH : [Washington, DC] : [Springfield, Va.] : Department of Mathematics and Computer Science, Dartmouth College ; [National Aeronautics and Space Administration] ; [National Technical Information Service, distributor], 1990Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
12
Analyzing the security of an existing computer system by Bishop, Matt (Matthew A.)
[Moffett Field, CA?] : Research Institute for Advanced Computer Science, NASA Ames Research Center, 1986Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
13
Profiling under UNIX by patching by Bishop, Matt (Matthew A.)
[Moffett Field, Calif.?] : Research Institute for Advanced Computer Science, NASA Ames Research Center, 1986Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
14
The RIACS intelligent auditing and categorizing system by Bishop, Matt (Matthew A.)
[Moffett Field, CA] : Research Institute for Advanced Computer Science, 1988Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
15
Computer security : art and science by Bishop, Matt (Matthew A.)
Boston : Addison-Wesley, 2003Call Number: Loading…
Located: Loading…Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
16
The fast encryption package by Bishop, Matt (Matthew A.)
[Moffett Field, CA] : Research Institute for Advanced Computer Science, 1988Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
17
Introduction to computer security by Bishop, Matt (Matthew A.)
Boston : Addison-Wesley, 2005Call Number: Loading…
Located: Loading…Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
18
Theft of information in the take-grant protection model by Bishop, Matt (Matthew A.)
[Washington, DC : Springfield, Va. : National Aeronautics and Space Administration ; National Technical Information Service, distributor, 1989Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
19
Access control and privacy in large distributed systems by Leiner, B. (Barry)
[Moffett Field, Calif.?] : Research Institute for Advanced Computer Science, 1986Other Authors: “…Bishop, Matt…”
Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
20
Access control and privacy in large distributed systems by Leiner, Barry M.
[Moffett Field, Calif.?] : Research Institute for Advanced Computer Science, 1986Other Authors: “…Bishop, Matt (Matthew A.)…”
Call Number: Loading…
Located: Loading…Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?>
Search Tools:
Related Subjects
Access control
Athletics
Physical education and training
Computer programming
Computer security
Computers
Computer files
Computer information security
Computer science
Information flow
Models
Passwords
Policies
Protection
Track and field
Training
Computer Security
Computer network protocols
Computer software
Computer viruses
Computerbeveiliging
Computersicherheit
Databescherming
Datensicherung
Information transfer
Jumping
Plyometrics
Running
Sécurité informatique
Snowdrops