Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             9 results found
no title author magazine year volume issue page(s) type
1 Addressing Privacy Issues During Disaster Recovery Herold, Rebecca
2006
14 6 p. 16-22
article
2 Best Practices for Building a Security Operations Center Kelley, Diana
2006
14 6 p. 27-32
article
3 Disclosure of Information Theft: The ChoicePoint Security Breach Freeman, Edward H.
2006
14 6 p. 11-15
article
4 Don't Trust Your Vendor's Software Distribution Methodology Storms, Andrew
2006
14 6 p. 38-43
article
5 Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle Kodaganallur, Viswanathan
2006
14 6 p. 44-52
article
6 Source Code Implications for Malcode Dunham, Ken
2006
14 6 p. 6-10
article
7 The Inside-Out Approach to Infection Control Milito, Rodolfo A.
2006
14 6 p. 33-37
article
8 Visa, Everywhere You Want to Be Tiller, Jim
2006
14 6 p. 2-5
article
9 Why You Should Not Play the Numbers Game with Anti-Spyware Vendors English, Ed
2006
14 6 p. 23-26
article
                             9 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands