Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 Argentine hacker faces court 1998
1998 1 p. 2-
1 p.
article
2 Biometric products eye mass market 1998
1998 1 p. 5-
1 p.
article
3 Crypto software available over internet 1998
1998 1 p. 4-
1 p.
article
4 DVD cracked Wehde, Ed
1998
1998 1 p. 7-
1 p.
article
5 England ponders trade secrets law 1998
1998 1 p. 9-
1 p.
article
6 Events 1998
1998 1 p. 20-
1 p.
article
7 Framework for evaluating security protocols in a banking environment Eloff, J.H.P.
1998
1998 1 p. 15-19
5 p.
article
8 Industry council presses for data protection bill 1998
1998 1 p. 4-
1 p.
article
9 Network associates abandons key recovery alliance 1998
1998 1 p. 3-
1 p.
article
10 Network security firms join forces 1998
1998 1 p. 3-
1 p.
article
11 RSA contests continue 1998
1998 1 p. 4-
1 p.
article
12 Security systems are not convincing internet users 1998
1998 1 p. 3-
1 p.
article
13 Self regulation proposed Wehde, Ed
1998
1998 1 p. 8-
1 p.
article
14 So, who invented public key cryptography? 1998
1998 1 p. 3-
1 p.
article
15 Sun premieres Java cryptography toolkit 1998
1998 1 p. 5-
1 p.
article
16 Telecoms fraud, the gory details Hoath, Peter
1998
1998 1 p. 10-14
5 p.
article
17 Trojan horses 1998
1998 1 p. 2-
1 p.
article
18 US vulnerable to cyberterrorism 1998
1998 1 p. 6-7
2 p.
article
19 Worm alert 1998
1998 1 p. 2-
1 p.
article
20 Y2K sidelined in Asia and Europe 1998
1998 1 p. 4-
1 p.
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands