Garfinkel, Simson.
Garfinkel, Simson, 1965-
Simson Garfinkel American academic and journalist
Garfinkel, Simson, 19..-....
Garfinkel, Simson L., 1965-
Garfinkel, Simson L.
VIAF ID: 34564359 (Personal)
Permalink: http://viaf.org/viaf/34564359
Preferred Forms
-
-
-
-
- 100 1 _ ‡a Garfinkel, Simson
- 100 1 _ ‡a Garfinkel, Simson
-
-
-
-
-
- 100 1 _ ‡a Garfinkel, Simson
- 100 1 _ ‡a Garfinkel, Simson
-
-
- 100 1 _ ‡a Garfinkel, Simson ‡d 1965-
- 100 1 _ ‡a Garfinkel, Simson ‡d 1965-
- 100 1 _ ‡a Garfinkel, Simson, ‡d 19..-....
- 100 1 _ ‡a Garfinkel, Simson, ‡d 1965-
-
-
- 100 0 _ ‡a Simson Garfinkel ‡c American academic and journalist
4xx's: Alternate Name Forms (14)
5xx's: Related Names (2)
Works
Title | Sources |
---|---|
The 2020 Census Disclosure Avoidance System TopDown Algorithm | |
AFF | |
AIDS and the Soundex code | |
Architects of the information society : thirty-five years of the Laboratory for Computer Science at MIT | |
Automating Disk Forensic Processing with SleuthKit, XML and Python | |
Bezpečnost v UNIXu a Internetu v praxi : počítačová ochrana | |
Bitfrost | |
Bōsōsuru puraibashī : Tekunorojī ga abakiya no buki ni naru hi | |
Building cocoa applications a step by step guide | |
Can We Sniff Wi-Fi?: Implications of Joffe v. Google | |
Column: Every Last Byte | |
Column: Factors Affecting Data Decay | |
Column: File Cabinet Forensics | |
Comércio & segurança na Web : riscos, tecnologias e estratégias | |
The Computer Book : from the abacus to artificial intelligence, 250 milestones in the history of computer science | |
The cybersecurity risk | |
Database nation : the death of privacy in the 21st century | |
Digital forensics research: The next 10 years | |
Digital forensics XML and the DFXML toolset | |
Document & media exploitation | |
File Fragment Classification-The Case for Specialized Approaches | |
Forensic carving of network packets and associated data structures | |
Forensic feature extraction and cross-drive analysis | |
Global Analysis of Drive File Times | |
Government Data De-Identification Stakeholder's Meeting June 29, 2016 Meeting Report | |
Guest Editors' Introduction: Data Surveillance | |
De-identification of personal information | |
Information of the world, unite! | |
Institutional review boards and your research | |
Internet ja roskaposti | |
Issues Encountered Deploying Differential Privacy | |
Language translation for file paths | |
Law and policy for the quantum age | |
Leaderless resistance today | |
Leaking Sensitive Information in Complex Document Files--and How to Prevent It | |
n92079279 | |
NeXTSTEP programming step one: object oriented applications | |
Operations with Degraded Security | |
PGP, c1995: | |
PGP : pretty good privacy | |
PGP : 暗号メールと電子署名 Encryption for everyone | |
Pījīpī | |
Practical UNIX and Internet security | |
Practical Unix security | |
The prevalence of encoded digital trace evidence in the nonfile space of computer media(,) (.). | |
RFID | |
RFID 응용 기술과 보안, 그리고 프라이버시 보호 기술 | |
Security and usability : designing secure systems that people can use | |
Sharp Figures, Fuzzy Purpose | |
Stopping spam | |
Toward algorithmic transparency and accountability | |
Trustworthy Email | |
UNIX & intanetto sekyuriti. | |
UNIX &インターネットセキュリティ | |
The UNIX-HATERS Handbook | |
UNIXセキュリティ : Computer security | |
UNIX痛恨者手冊 | |
Usable Security: History, Themes, and Challenges | |
Web security & commerce | |
Web security, privacy and commerce | |
Web sekyuriti puraibashi & komasu. | |
Webセキュリティ, プライバシー&コマース. | |
WWW - bezpieczeństwo i handel | |
Yunikkusu sekyuriti. | |
کتاب راهنمای یونیکسبیزاران | |
데이터베이스 제국 | |
暴走するプライバシー : テクノロジーが「暴き屋」の武器になる日 |