Guard (information security) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Guard (information security)" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
low place
low place
505th place
410th place
833rd place
567th place
low place
low place
low place
low place
2,007th place
1,298th place
low place
low place
low place
low place
low place
low place
2,128th place
1,553rd place
low place
low place
low place
low place
low place
low place
low place
low place
940th place
907th place
207th place
136th place
low place
low place

blackhat.com

commoncriteriaportal.org

cryptosmith.com

deep-secure.com

doi.org

  • John Rushby (1981). "Design and Verification of Secure Systems" (PDF). ACM Operating Systems Review. 15 (5). SRI International Computer Science Laboratory: 12–21. doi:10.1145/1067627.806586.
  • Read "Computers at Risk: Safe Computing in the Information Age" at NAP.edu. 1991. doi:10.17226/1581. ISBN 978-0-309-04388-5.

dtic.mil

apps.dtic.mil

fas.org

ieeecomputersociety.org

doi.ieeecomputersociety.org

metroguards.com.au

military-information-technology.com

nap.edu

nato.int

ia.nato.int

nexor.com

psu.edu

citeseerx.ist.psu.edu

qinetiq.com

rockwellcollins.com

sans.org

sri.com

csl.sri.com

  • John Rushby (1981). "Design and Verification of Secure Systems" (PDF). ACM Operating Systems Review. 15 (5). SRI International Computer Science Laboratory: 12–21. doi:10.1145/1067627.806586.

unm.edu

cs.unm.edu

web.archive.org