Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 Ami pro virus discovered by reflex magnetics 1996
1996 2 p. 6-
1 p.
article
2 Bipartisan support for medical records bill Sterlicchi, John
1996
1996 2 p. 9-10
2 p.
article
3 BSA calls for stronger copyright protection for EC 1996
1996 2 p. 4-
1 p.
article
4 Christmas present hackers 1996
1996 2 p. 3-
1 p.
article
5 Criminal justice act enhances data protection act 1996
1996 2 p. 5-
1 p.
article
6 E-mail bomb suspect arrested 1996
1996 2 p. 3-
1 p.
article
7 Free to existing customers anti-virus software for windows 95 1996
1996 2 p. 7-
1 p.
article
8 Green card means free satellite TV 1996
1996 2 p. 2-
1 p.
article
9 Hackers crack codes that scramble satellite broadcasts McCormack, Michael
1996
1996 2 p. 19-
1 p.
article
10 Highest piracy rates for Czech Republic and Slovakia 1996
1996 2 p. 4-
1 p.
article
11 Hong Kong firewall to protect government secrets 1996
1996 2 p. 2-
1 p.
article
12 Identify and analyze the threats with JSEAL8 1996
1996 2 p. 7-
1 p.
article
13 Intel puts the caps on chip speed Kaneshige, Thomas
1996
1996 2 p. 9-
1 p.
article
14 Labels help prevent counterfeiting 1996
1996 2 p. 8-
1 p.
article
15 Location-based authentication: Grounding cyberspace for better security Denning, Dorothy E.
1996
1996 2 p. 12-16
5 p.
article
16 Notes gets extra 24 bits crucial for security 1996
1996 2 p. 8-
1 p.
article
17 Poulsen escapes espionage charges Sterlicchi, John
1996
1996 2 p. 11-
1 p.
article
18 RAM-alert combats RAM raiding 1996
1996 2 p. 7-
1 p.
article
19 SecureNet '96 1996
1996 2 p. 6-
1 p.
article
20 Security puts microsoft in AtOnce's hands Sterlicchi, John
1996
1996 2 p. 10-11
2 p.
article
21 Siemens product gets ITSEC evaluation 1996
1996 2 p. 5-
1 p.
article
22 The information super highway — porn in the game? Maybury, Nell
1996
1996 2 p. 17-18
2 p.
article
23 The three-pronged deterrent 1996
1996 2 p. 8-
1 p.
article
24 Three lab assistants sacked for downloading porn 1996
1996 2 p. 5-
1 p.
article
25 Timing attacks: another threat to security Madson, Amanda
1996
1996 2 p. 10-
1 p.
article
26 Virus components give away secrets of their creation 1996
1996 2 p. 6-
1 p.
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands