Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 A systematic methodology for firewall penetration testing Moyer, Philip R.
1996
1996 3 p. 11-18
8 p.
article
2 Business class Internet service 1996
1996 3 p. 3-4
2 p.
article
3 CompuServe in Germany suffers another inquiry 1996
1996 3 p. 3-
1 p.
article
4 Corrupt information from network servers 1996
1996 3 p. 2-
1 p.
article
5 CyberGuard's new enhancements 1996
1996 3 p. 5-
1 p.
article
6 Events 20 1996
1996 3 p. 20-
1 p.
article
7 Governments pressed tor agreement on encryption 1996
1996 3 p. 3-
1 p.
article
8 IBM to develop secure version Savarnejad, Atoosa
1996
1996 3 p. 6-
1 p.
article
9 Integralis revenues rise 60% 1996
1996 3 p. 4-
1 p.
article
10 Internet holes — Part 7: The human side Cohen, Fred
1996
1996 3 p. 7-10
4 p.
article
11 Internet security purchase for HP 1996
1996 3 p. 2-3
2 p.
article
12 Kerberos gets cracked Savarnejad, Atoosa
1996
1996 3 p. 6-
1 p.
article
13 Microsoft's Internet information server 1996
1996 3 p. 4-5
2 p.
article
14 SecurID authentication for BayRS routers 1996
1996 3 p. 4-
1 p.
article
15 Security system for electronic cash 1996
1996 3 p. 4-
1 p.
article
16 Security technologies aid ITT transition Sterlicchi, John
1996
1996 3 p. 5-6
2 p.
article
17 SunSoft demo CDs contain a security threatening flaw 1996
1996 3 p. 2-
1 p.
article
18 The firewall with the new dual wall 1996
1996 3 p. 5-
1 p.
article
19 The freedom of information act and the 2600 Club Osen, Janet
1996
1996 3 p. 19-
1 p.
article
20 Visa and MasterCard combine security specifications 1996
1996 3 p. 4-
1 p.
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands