Author: Glenn B. Dietrich

Publication Overview

Publication period start: 2008
Number of co-authors: 6

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Conklin, Art, Dietrich, Glenn B., Walz, Diane B. (2004): Password-Based Authentication: A System Perspective. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/07/205670170babs.htm
Dietrich, Glenn B., Shipley, Marcus B. (1999): Technology Strategies in a Complex Environment. In: HICSS 1999 , 1999, . https://csdl.computer.org/comp/proceedings/hicss/1999/0001/07/00017058abs.htm
White, Gregory B., Dietrich, Glenn B., Goles, Tim (2004): Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respon. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/07/205670170aabs.htm
Conklin, Wm. Arthur, Dietrich, Glenn B. (2007): Secure Software Engineering: A New Paradigm. In: HICSS 2007 - 40th Hawaii International International Conference on Systems Science 3-6 January, 2007, Waikoloa, Big Island, HI, USA. pp. 272. https://doi.ieeecomputersociety.org/10.1109/HICSS.2007.477
Conklin, Wm. Arthur, Dietrich, Glenn B. (2008): Systems Theory Model for Information Security. In: HICSS 2008 - 41st Hawaii International International Conference on Systems Science 7-10 January, 2008, Waikoloa, Big Island, HI, USA. pp. 265. https://doi.ieeecomputersociety.org/10.1109/HICSS.2008.421
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,062 others.

Learn to design a life you love.

Next email in
6
days
13
hrs
49
mins
9
secs