Author: Glenn B. Dietrich

Publication Overview

Publication period start: 2008
Number of co-authors: 6

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Conklin, Art, Dietrich, Glenn B., Walz, Diane B. (2004): Password-Based Authentication: A System Perspective. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/07/205670170babs.htm
Dietrich, Glenn B., Shipley, Marcus B. (1999): Technology Strategies in a Complex Environment. In: HICSS 1999 , 1999, . https://csdl.computer.org/comp/proceedings/hicss/1999/0001/07/00017058abs.htm
White, Gregory B., Dietrich, Glenn B., Goles, Tim (2004): Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respon. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/07/205670170aabs.htm
Conklin, Wm. Arthur, Dietrich, Glenn B. (2007): Secure Software Engineering: A New Paradigm. In: HICSS 2007 - 40th Hawaii International International Conference on Systems Science 3-6 January, 2007, Waikoloa, Big Island, HI, USA. pp. 272. https://doi.ieeecomputersociety.org/10.1109/HICSS.2007.477
Conklin, Wm. Arthur, Dietrich, Glenn B. (2008): Systems Theory Model for Information Security. In: HICSS 2008 - 41st Hawaii International International Conference on Systems Science 7-10 January, 2008, Waikoloa, Big Island, HI, USA. pp. 265. https://doi.ieeecomputersociety.org/10.1109/HICSS.2008.421
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,061+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
1
day
0
hrs
19
mins
2
secs

Free forever. No spam. Unsubscribe anytime.