Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             8 results found
no title author magazine year volume issue page(s) type
1 De-Perimeterisation: Benefits and limitations Palmer, Graham
2005
10 4 p. 189-203
15 p.
article
2 Editorial: “The security perimeter” Price, G.
2005
10 4 p. 185-
1 p.
article
3 Firewalls – Are they enough protection for current networks? Stuart Broderick, J.
2005
10 4 p. 204-212
9 p.
article
4 Inventing the future – The vision of the Jericho Forum Lacey, David
2005
10 4 p. 186-188
3 p.
article
5 The extended security perimeter Walker, John
2005
10 4 p. 220-227
8 p.
article
6 The Laws of Vulnerabilities: Which security vulnerabilities really matter? Eschelbeck, Gerhard
2005
10 4 p. 213-219
7 p.
article
7 Web services: Developers dream or hackers heaven? Curphey, Mark
2005
10 4 p. 228-235
8 p.
article
8 Why ‘Phish’ when you can Trawl? Cracknell, Phil
2005
10 4 p. 236-239
4 p.
article
                             8 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands