enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of academic publishers by preprint policy - Wikipedia

    en.wikipedia.org/wiki/List_of_academic...

    Submission of preprints is accepted by all open access journals. Over the last decade, they have been joined by most subscription journals, however publisher policies are often vague or ill-defined. [1] In general, most publishers that permit preprints require that:

  3. FIPS 140 - Wikipedia

    en.wikipedia.org/wiki/FIPS_140

    FIPS 140-2 defines four levels of security, simply named "Level 1" to "Level 4". It does not specify in detail what level of security is required by any particular application. FIPS 140-2 Level 1 the lowest, imposes very limited requirements; loosely, all components must be "production-grade" and various egregious kinds of insecurity must be ...

  4. IEEE Transactions on Dependable and Secure Computing

    en.wikipedia.org/wiki/IEEE_Transactions_on...

    The IEEE Transactions on Dependable and Secure Computing is a bimonthly peer-reviewed scientific journal covering all aspects of dependability and security. It is published by the IEEE Computer Society and was established in 2004. The current editor-in-chief is Jaideep Vaidya (Rutgers University).

  5. List of IEEE publications - Wikipedia

    en.wikipedia.org/wiki/List_of_IEEE_publications

    The IEEE also publishes more than 750 conference proceedings every year. [3] In addition, the IEEE Standards Association maintains over 1,300 standards in engineering. Some of the journals are published in association with other societies, like the Association for Computing Machinery (ACM), the American Society of Mechanical Engineers (ASME ...

  6. Information security standards - Wikipedia

    en.wikipedia.org/wiki/Information_security_standards

    Cybersecurity standards have existed over several decades as users and providers have collaborated in many domestic and international forums to effect the necessary capabilities, policies, and practices – generally emerging from work at the Stanford Consortium for Research on Information Security and Policy in the 1990s.

  7. Computer Law & Security Review - Wikipedia

    en.wikipedia.org/wiki/Computer_Law_&_Security_Review

    The Computer Law & Security Review is a journal accessible to a wide range of professional legal and IT practitioners, businesses, academics, researchers, libraries and organisations in both the public and private sectors, the Computer Law and Security Review regularly covers: CLSR Briefing with special emphasis on UK/US developments

  8. AOL

    search.aol.com

    The search engine that helps you find exactly what you're looking for. Find the most relevant information, video, images, and answers from all across the Web.

  9. Category:Computer science journals - Wikipedia

    en.wikipedia.org/wiki/Category:Computer_science...

    Cluster Computing (journal) Cognitive Systems Research; Combinatorica; Communications of the ACM; Complex Systems (journal) Computational and Mathematical Organization Theory; Computational Mechanics (journal) Computer Aided Surgery (journal) The Computer Journal; Computer Law & Security Review; Computer Networks (journal) Computer Science ...