Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             11 results found
no title author magazine year volume issue page(s) type
1 A distributed systems approach to secure Internet mail Machanick, Philip
2005
24 6 p. 492-499
8 p.
article
2 A novel digital image watermarking scheme based on the vector quantization technique Wu, Hsien-Chu
2005
24 6 p. 460-471
12 p.
article
3 Can critical infrastructures rely on the Internet? Fischer, W.
2005
24 6 p. 485-491
7 p.
article
4 Host intrusion prevention: Part of the operating system or on top of the operating system? Hofmeyr, S.
2005
24 6 p. 440-442
3 p.
article
5 Improvement on the flexible tree-based key management framework Hwang, Min-Shiang
2005
24 6 p. 500-504
5 p.
article
6 Information Security Governance – Compliance management vs operational management von Solms, S.H. (Basie)
2005
24 6 p. 443-447
5 p.
article
7 Information security policy's impact on reporting security incidents Wiant, Terry L.
2005
24 6 p. 448-459
12 p.
article
8 Security views Schultz, E.
2005
24 6 p. 427-436
10 p.
article
9 Telecom fraud: The cost of doing nothing just went up Pollard, C.
2005
24 6 p. 437-439
3 p.
article
10 The human factor in security Schultz, Eugene
2005
24 6 p. 425-426
2 p.
article
11 The insider threat to information systems and the effectiveness of ISO17799 Theoharidou, Marianthi
2005
24 6 p. 472-484
13 p.
article
                             11 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands