![]() ![]() ![]() | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Note: Links lead to the DBLP on the Web. Scott Lathrop David Joiner , Steven Gordon , Scott Lathrop, Marilyn McClelland , D. E. Stevenson : Applying verification, validation, and accreditation processes to digital libraries. JCDL 2005 : 382 Donald Welch , Scott Lathrop: Wirless Security Threat Taxonomy. IAW 2003 : 76-83 Gregory J. Conti , John M. D. Hill , Scott Lathrop, Kenneth L. Alford , Daniel Ragsdale : A Comprehensive Undergraduate Information Assurance Program. World Conference on Information Security Education 2003 : 243-260 Scott Lathrop: Integrating multi-site information through Gopher. SIGUCCS 1993 : 21-22 1 [ 2 ] 2 [ 2 ] 3 [ 4 ] 4 [ 2 ] 5 [ 4 ] 6 [ 4 ] 7 [ 2 ] 8 [ 4 ] 9 [ 3 ] ![]() ©2006 Association for Computing Machinery |