Search

Your search keyword '"Mercuri, Rebecca T."' showing total 24 results

Search Constraints

Start Over You searched for: Author "Mercuri, Rebecca T." Remove constraint Author: "Mercuri, Rebecca T."
24 results on '"Mercuri, Rebecca T."'

Search Results

1. Inside Risks: The Risks of Election Believability (or Lack Thereof): With 90% of the 2020 U.S. general election ballot contents verifiable by paper, why do only 65% of voters trust the results?

4. Scoping identity theft

5. Trusting in Transparency

7. The code of elections

8. The HIPAA-potamus in Health Care Data Security

9. Superscaled security

10. Standards insecurity

11. Analyzing security costs: quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs

12. Computer security: quality rather than quantity: the challenge of applying protection to systems, software, and networks with intrinsic vulnerabilities is a lofty, but ultimately realizable, one

13. The Risks of Self-Auditing Systems.

14. Analyzing Security Costs.

15. On Auditing Audit Trails.

16. System Integrity Revisited

22. Election Auditing and Verifiability.

23. Why Count Lines of Code?

24. Computers and Consciousness.

Catalog

Books, media, physical & digital resources