no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Barclays' pilot for electronic commerce
|
|
|
1996 |
1996 |
7 |
p. 5- 1 p. |
article |
2 |
Businesses get help to beat Internet crime
|
|
|
1996 |
1996 |
7 |
p. 4- 1 p. |
article |
3 |
CKS MyNet, the answer to single sign-on?
|
|
|
1996 |
1996 |
7 |
p. 7- 1 p. |
article |
4 |
Companies adopt Internet commerce solutions
|
|
|
1996 |
1996 |
7 |
p. 4- 1 p. |
article |
5 |
Credit-card company seeks strong encryption
|
|
|
1996 |
1996 |
7 |
p. 5- 1 p. |
article |
6 |
Events
|
|
|
1996 |
1996 |
7 |
p. 20- 1 p. |
article |
7 |
Internet holes — Part 11: Internet lightning rods
|
Cohen, Fred |
|
1996 |
1996 |
7 |
p. 9-13 5 p. |
article |
8 |
IronBridge and IronWall
|
|
|
1996 |
1996 |
7 |
p. 6-7 2 p. |
article |
9 |
Librarians develop Internet protocol
|
|
|
1996 |
1996 |
7 |
p. 5-6 2 p. |
article |
10 |
McAfee and Microsoft clean up Internet
|
Kaneshige, Thomas |
|
1996 |
1996 |
7 |
p. 9- 1 p. |
article |
11 |
Revisions in SET mark advances to secure Cyberspace shopping
|
Savarnejad, Atoosa |
|
1996 |
1996 |
7 |
p. 8- 1 p. |
article |
12 |
Right mouse click could allow in viruses
|
|
|
1996 |
1996 |
7 |
p. 3- 1 p. |
article |
13 |
Secure Virtual Private Networks
|
|
|
1996 |
1996 |
7 |
p. 6- 1 p. |
article |
14 |
Security and authentication offered
|
|
|
1996 |
1996 |
7 |
p. 3-4 2 p. |
article |
15 |
Security framework from Microsoft
|
Sterlicchi, John |
|
1996 |
1996 |
7 |
p. 7-8 2 p. |
article |
16 |
Serverware launches new version of SeNTry
|
|
|
1996 |
1996 |
7 |
p. 6- 1 p. |
article |
17 |
Suidperl vulnerability
|
|
|
1996 |
1996 |
7 |
p. 2-3 2 p. |
article |
18 |
Superman is alive and well and living in wapping
|
Lindup, Ken |
|
1996 |
1996 |
7 |
p. 18- 1 p. |
article |
19 |
The end of the virus problem
|
Solomon, Alan |
|
1996 |
1996 |
7 |
p. 13-17 5 p. |
article |
20 |
Total secure networking solutions incorporates CyberGuard
|
|
|
1996 |
1996 |
7 |
p. 4-5 2 p. |
article |
21 |
Vulnerability in DEC software security kits
|
|
|
1996 |
1996 |
7 |
p. 2- 1 p. |
article |
22 |
Vulnerability in the dip program
|
|
|
1996 |
1996 |
7 |
p. 2- 1 p. |
article |